1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
geniusboy [140]
3 years ago
5

Which software is designed to prevent malicious software from accessing your computer?

Computers and Technology
1 answer:
Mandarinka [93]3 years ago
7 0
In what way might i ask?
Either its
Firewalls
Anti-virus
Anti-malware
Anti-Randsomware 
Either one
You might be interested in
The sequence of instructions performed to execute one program instruction
Feliz [49]

Answer:

The CPU. The CPU is the heart of the computer. A program is a sequence of instructions stored in main memory. When a program is run, the CPU fetches the instructions and executes or follows the instructions.

Explanation:

hope you get ur answer

......

3 0
2 years ago
You have been hired by a small company to install a backbone to connect four 100base-T Ethernet LANs (each using one 24-port hub
stich3 [128]

Answer:

I don't speak english

I don't speak english

7 0
2 years ago
Brainliest
olya-2409 [2.1K]

Answer:

browsing history

Explanation:

....

6 0
2 years ago
Read 2 more answers
How are clustering and Network Load Balancing similar?
Elza [17]

Answer:

Load balancing is the mechanism happening between the different components to achieve the aim independently in the server. They are not aware of the presence of the other resources with them.

Clustering is the process in which the components work to gain the desired results in the form of group.They work in group so that there are no chances of crash  in server.

The similarity arises between these two process are :

  • They have capability to work even after failure of system
  • Can have unnecessary access to the information
  • Scalable

5 0
3 years ago
11.
dsp73
11. <span><span>their population crashed.
</span><span>
12. </span></span><span>dead zone

13. I believe </span><span>energy efficient</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Computer communications describes a process in which two or more computers or devices transfer ____.
    10·1 answer
  • How to revert a dismissed javascript popup alert box in chrome?
    5·1 answer
  • . Constructors can / cannot (circle correct choice) be called explicitly as if they were regular member functions.
    10·1 answer
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • Assuming there are 100 million households in the US, and that each household has two HDTVs, and that each TV is used to watch 4
    15·1 answer
  • Amy just added a 462 meter run of fiber optic cable to the network what should she do next?
    10·1 answer
  • Limitations of the information systems used by tesco​
    7·1 answer
  • IF YOU PLAY SURVIV&gt;IO WITH ME RIGHT NOW I WILL GIVE YOU BRAINLIEST<br> AND IM NOT KAPPING
    5·1 answer
  • Derek has to create a technical design of a complex floor plan using CAD. What will be most helpful for Derek to use to create t
    8·1 answer
  • reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!