1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
4 years ago
5

Which software is designed to prevent malicious software from accessing your computer?

Computers and Technology
1 answer:
Mandarinka [93]4 years ago
7 0
In what way might i ask?
Either its
Firewalls
Anti-virus
Anti-malware
Anti-Randsomware 
Either one
You might be interested in
A(n ________ is information that is passed to a function, and a(n ________ is information that is received by a function.
pantera1 [17]

Information passed to a function: Argument.

Information received by a function: Parameter.


5 0
3 years ago
5. RAM IS YOUR SYSTEM’S-
Montano1993 [528]
We’re is the question?
8 0
3 years ago
Read 2 more answers
XYZ Corp.’s facilities in Nashua, New Hampshire, are two office buildings 400 feet apart, each with its own LAN. To connect the
damaskus [11]

Answer:

a: Twisted pair won't span a 400-foot distance.

Explanation:

The maximum distance that twisted pair cables can support without attenuation is 100 meters which is approximately 328 feet and the two office buildings are 400 feet apart, so it is useless to install a twisted pair cable for such a large distance. A much better option would be to install optic fiber. Though it is a bit expensive but it is the best option in this case.

Hence option (a) is the correct reason for installing an optic fiber cable rather than a twisted pair cable.

6 0
3 years ago
Can someone answer this ?
Alexxx [7]

Solid: Wood/Rock

Liquid: Water/tea

Vapour: Steam/smoke

7 0
3 years ago
An important factor to consider when purchasing new software is to investigate how much storage the application and associated d
kolbaska11 [484]

Answer: you need data files

Explanation: becusue you need to save

3 0
3 years ago
Other questions:
  • You created a database related to medicinal plants and their uses. For every plant, you would like to enter a description about
    11·1 answer
  • When you buy a trackphone, do you have to pay a monthly wage or do you just need to buy the minutes and that's all?
    13·2 answers
  • What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash
    12·1 answer
  • When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
    11·1 answer
  • What is not a basic function of a computer?
    10·2 answers
  • What is the output of executing the code segment?
    7·1 answer
  • Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch
    8·1 answer
  • Create a page using PHP for a business website that will ask the user to enter his or her name into text boxes and will display
    5·1 answer
  • Why do you think they added the wait .5 seconds block?
    13·1 answer
  • Describing Report Tools Functions
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!