1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sladkaya [172]
3 years ago
12

Advantage and disavantage of malware maintenance

Computers and Technology
1 answer:
damaskus [11]3 years ago
8 0
Well, advantages are,

it keeps your computer secure
less likely to get a virus or malware
can keep your passwords and bank details safe if entered online (if you use software like avast)

disadvantages are

they can be expensive to buy
can use a lot of room on your pc
sometimes cant fully remove a virus and just puts it into a virus locker or chest
they can sometimes be almost impossible to remove and act like a virus themselves (norton, avg etc)
You might be interested in
Ill give alot of points if you answer: How do I get a 100 dollar ps4
stepladder [879]
Uh how do you get a little blue box in a sandwich
8 0
3 years ago
Read 2 more answers
Does trend in computing important for organization management?​
mario62 [17]

Answer:

yes it is...................

6 0
3 years ago
You have just received a generic-looking email that is addressed as coming from the administrator of your company. The email say
natta225 [31]

Answer:

Delete and block the email. It is obviously a scam.

Add-on:

I hope this helped you at all.

6 0
3 years ago
Why does everyone refer to dogs as being loyal
LenKa [72]

Explanation:

Because they're like another member of the pack.

7 0
3 years ago
Read 2 more answers
write a simple assembly code using 8088 microprocessor instruction set to add two numbers ? please help me if you know :(​
Kay [80]

Answer:

sexxxxx chaaaaat insta id abhilash0351

3 0
3 years ago
Other questions:
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • When a diaphragm contracts, a person is<br>Exhaling<br>Inhaling​
    12·2 answers
  • If you need to define a connection request policy to apply to an 802.1x authenticating switch or a wireless access point, which
    12·1 answer
  • pDevices used to prevent data from being written to a disk can connect to a computer through FireWire, SATA, PATA, and SCSI cont
    10·1 answer
  • Communication of a message between two processes implies which of the following? (A) Synchronization (B) Atomic operation (C) Bl
    11·1 answer
  • The difference between a dot matrix printer and a line printer
    9·2 answers
  • How to clear a function in functional component react.
    6·1 answer
  • Ten ways ict has helped in social development
    7·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!