1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
4 years ago
12

Advantage and disavantage of malware maintenance

Computers and Technology
1 answer:
damaskus [11]4 years ago
8 0
Well, advantages are,

it keeps your computer secure
less likely to get a virus or malware
can keep your passwords and bank details safe if entered online (if you use software like avast)

disadvantages are

they can be expensive to buy
can use a lot of room on your pc
sometimes cant fully remove a virus and just puts it into a virus locker or chest
they can sometimes be almost impossible to remove and act like a virus themselves (norton, avg etc)
You might be interested in
If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
AveGali [126]

Answer:

HAZMAT certificate

Explanation:

If you face an investigation where dangerous substances might be around, you may need to obtain a HAZMAT certificate.

Hazmat is the shortened form of the word "hazardous materials," which the United State Department of Transportation recognized as materials that could adversely affect people and also the environment. Hazmat certification is required to be obtained by workers who remove, handle, or transport hazardous materials. This comprises careers in transportation and shipping, firefighting and emergency rescue, construction and mining, as well as waste treatment and disposal. Workers who are also in manufacturing and warehouse storage may also come across hazardous substance or materials risks while on their jobs. Certification involves having the knowledge of the risks and safety measures for handling these materials.

6 0
3 years ago
Read 2 more answers
The ____ algorithm was the first public key encryption algorithm developed (in 1977 and published for commercial use.
Whitepunk [10]
The RSA Algorithm was developed by and named after the initials of: Ron Rivist, Adi Shamir, and Leonard Adleman while they were working at MIT. It was developed in 1977 and published in 1978.  The algorithm uses the exponentiation modulo in encrypt and decrypt information. 
7 0
4 years ago
Why do computers use binary code?
Anna71 [15]

Answer:

To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand

4 0
3 years ago
Read 2 more answers
FS and GS are two___________________ in protected mode.
masha68 [24]

Answer:

Segment registers

Explanation:

The initial purpose behind the segment registers was to enable a program to access many distinct (big) memory sections designed to be autonomous and part of a constant virtual store.

They don't have a processor-defined objective, but instead Operating system runs them for purpose. The GS register is used in Windows 64-bit to point to constructions defined by the operating scheme.   Operating system kernels usually use FS and GS to access thread-specific memory. In windows, thread-specific memory is managed using the GS register. To access cpu-specific memory, the linux kernel utilizes GS.

7 0
3 years ago
What leadership style involves the ideas of advice others
makvit [3.9K]
Democrat good luck dude
5 0
3 years ago
Other questions:
  • What is the difference between primary storage,secondary storage and offline storage what type of storage can be
    6·2 answers
  • The ____________ mechanism consists of a lever arm attached to the mousetrap spring.
    15·1 answer
  • Which element would the search element be compared to first, if abinary search were used on the list above?
    6·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • 9.4 Code Practice: Your task is to determine whether each item in the array above is divisible
    14·1 answer
  • Login
    11·1 answer
  • Which of these might be an example of an advertiser's target group?
    12·2 answers
  • Write a multi-way if statement that compares the double variable pH with 7.0 and makes the following assignments to the bool var
    11·1 answer
  • What is an automatic update and when should you use it
    10·1 answer
  • consider a pipelined risc cpu with 14 stages. what is maximum speedup of this cpu over a non-pipelined implementation?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!