1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
4 years ago
10

All users on the network have antivirus software; however, several users report that they have what an administrator described a

s a "browser redirection virus." How can the users have this virus if they have updated antivirus software installed?
Computers and Technology
1 answer:
nika2105 [10]4 years ago
4 0

Answer:Users on a network can be affected by a ' browser redirection virus' if they open some browser being targeted by which they have subconsciously downloaded some free software called 'freeware' containing the virus on.

Explanation:

'Browser redirection virus" is actually a browser hijacker which may take over some functions like search engines, etc on a  browser used to download some freeware from the internet. It is often referred to as a Potentially Unwanted Program. Various browsers such as Safari, Google Chrome,Internet Explorer, Mozilla Firefox, etc may be targeted by persons with malicious freeware on the internet and while a user may knowingly download the freeware he/she needs, he/she may  have unknowingly downloaded some malware alongside, such as this Browser Redirection Virus. It basically redirects your home page, whenever you open the  browser, to the programmed ones  of  the attacker such as some other search engine, advertising sites, affiliate sites for products marketing, etc.    

The updated antivirus on the user system does not positively detect this as it is not a virus actually but some potentially unwanted program attached to the freeware downloaded from the internet by the user. This Potentially Unwanted Program is uploaded and attached online by some unscrupulous persons basically for some financial gains as it redirects your own page to those of  their own affiliates.

Hope this helps.

You might be interested in
The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and inclu
nekit [7.7K]

Answer:

allocated baseline

Explanation:

The allocated baseline documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

Hope this helps!

5 0
3 years ago
Read 2 more answers
According to Google data, among consumers who conduct a local search on their smartphone, how many then visit a store within a d
sertanlavr [38]

Answer:

According to the google data, 50% consumers visited a store when they conduct a local search on their smartphones within a day.

And consumers more than 60% range uses location data in the advertisements. They uses store location and phone number through the advisement on smartphones and laptop.  

More than 34% of consumers search on the laptops and computer are visited to a store within a day.

8 0
3 years ago
The valence electron configurations of several atoms are shown. how many bonds can each atom make without hybridization? 2s^2 2p
Pie
Answer: This element needs 3 electrons to complete its octet state

Why?:
since the electrons in 2s2 are already paired they cannot form a bond pair with electrons from other elements without hybridisation however the 3 electrons in 2p3 are unpaired so can form bond pairs with electrons from other elements without hybridisation.

Hope this helps!
3 0
4 years ago
Importance of word processing application​
alina1380 [7]

Answer:

Some of the functions of word processing software include: Creating, editing, saving and printing documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font type, bolding, underlining or italicizing.

Explanation:

8 0
4 years ago
Jeremy took this photo on his vacation in England. Which kind of lens did he use in his camera? Jeremy used lens in his camera.
Tema [17]

Answer:

I believe its a wide angle lens

Explanation:

6 0
3 years ago
Other questions:
  • • Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?
    5·1 answer
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • What is a characteristic of high-level computer programming languages?
    8·1 answer
  • If a suspect is not read his or her Miranda rights, then nothing the suspect says can be used at trial, even if the suspect volu
    11·1 answer
  • Can you find the ip address from a physical address
    13·1 answer
  • I need help ASAP please and thank you!
    11·1 answer
  • Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma
    11·1 answer
  • Your task is to build a palindrome from an input string.A palindrome is a word that readsthe same backward or forward. Your code
    12·1 answer
  • State 2 advantages of laptops over desktop computers
    11·2 answers
  • QUESTION 9 / 10
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!