1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
12

Advantage and disavantage of malware maintenance

Computers and Technology
1 answer:
damaskus [11]3 years ago
8 0
Well, advantages are,

it keeps your computer secure
less likely to get a virus or malware
can keep your passwords and bank details safe if entered online (if you use software like avast)

disadvantages are

they can be expensive to buy
can use a lot of room on your pc
sometimes cant fully remove a virus and just puts it into a virus locker or chest
they can sometimes be almost impossible to remove and act like a virus themselves (norton, avg etc)
You might be interested in
a third important logical element is the inverter. an inverter does pretty much what it says. if the input is 0, the output is 1
Mrrafil [7]

Answer:

xy225.252 <  \geqslant  > . \times 5 \times . =  {?}^{2}

7 0
3 years ago
Mike needs to write the primary objectives of a project in a project plan. In which section should he write them?
pochemuha
D because you are always supposed to use your schedule
5 0
3 years ago
For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used
qaws [65]

Answer:

These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.

Explanation:

Dual Stack Routers -  This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses

Tunneling -Tunneling is used as a medium to help the different IP versions  communicate with the transit network.

NAT Protocol Translation -  This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.

3 0
3 years ago
Decrypt this secret message if your able to a lot will come..
nata0808 [166]

Answer:-

Failure

and 0008

Hope This Helps

7 0
2 years ago
Read 2 more answers
You often need to have several applications open at the same time. Which requirement is related to this need?
Musya8 [376]

Answer:

processor speed is the answer but not sure

5 0
3 years ago
Other questions:
  • It is always better to run over and give more information when you are giving a presentation versus quitting on time.
    11·2 answers
  • What is an identifier? Give an example of an identifier.
    13·1 answer
  • Can multiple processors can be installed in a single processor housing?
    14·2 answers
  • Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
    14·1 answer
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • An anagram is a word or a phrase made by transposing the letters of another word or phrase; for example, "parliament" is an anag
    7·1 answer
  • The process in which a server is partitioned into smaller components virtually.
    9·1 answer
  • How many people are in Siver, on the game Valorant?
    14·1 answer
  • Create an application named SalesTransactionDemo that declares several SalesTransaction objects and displays their values and th
    12·1 answer
  • MSWord is a popular___________ program.​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!