1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
3 years ago
13

Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and lapto

ps. An optional addition. Already included by the manufacturer on all computers. Generally considered essential for personally-owned devices only.
Computers and Technology
1 answer:
k0ka [10]3 years ago
7 0

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

  • Digital signature
  • Heuristic detection
  • Behavior detection
  • Sandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

You might be interested in
The shortcut key combination to cut text is. Ctrl+C Ctrl+X Shift+V Shift+Y​
Gemiola [76]

Answer:

Ctrl + X

Explanation:

5 0
4 years ago
Read 2 more answers
Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
ICE Princess25 [194]

Answer:

Physical / Data link layer

Explanation:

If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.

The Open Systems Interconnection model (OSI model) has seven layers each with its own function.

The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.

The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.

4 0
4 years ago
Addison or Charli
Blizzard [7]

Answer:

1. Mum

2.Bro my sisters are more annoying

3.cat

Explanation:

yuh

3 0
3 years ago
Read 2 more answers
Write a recursive method called printNumPattern() to output the following number pattern. Given a positive integer as input (Ex:
TiliK225 [7]

Answer:

See Explanation Below

Explanation:

// C++ printNumPattern() recursive method

// Comments are used for explanatory purpose

// Only the recursive is submitted

// Method starts here

void printPattern(int num1, int num2, bool dec)  

{  

// Print num2.  

cout << num2 << " ";  

//Printing to num1

if (dec == false && num1 ==num2)  {

 return;  }

// Printing to 0 or negative.  

if (dec)  

{  

// If num2 is greater than num2

if (num2-num1 > 0)  

 printPattern(num1, num2-num1, true);  

else // recur with false dec  

 printPattern(num1, num2-num1, false);  

}  

else // If dec is false.  

 printPattern(num1, num2+num1, false);  

}  

//End of recursive

7 0
4 years ago
Where should the VPN concentrator be installed?
zmey [24]
C, using a firewall make sures no viruses enter your device while setting up the vpn
7 0
2 years ago
Read 2 more answers
Other questions:
  • The _______________ is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot
    6·1 answer
  • Which of the following statements is true?
    6·2 answers
  • When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
    5·1 answer
  • A technician is trying to recover information on a computer that has been hidden or deleted on purpose in order to hide evidence
    5·1 answer
  • My Mac is stuck on this screen? How to fix?
    10·1 answer
  • Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
    11·1 answer
  • What is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Mana
    12·1 answer
  • Hattie uses the line of code num == 7 to assign the number 7 to the variable named num. What correction should be made?
    7·1 answer
  • Why header files are needed in every c program ?expalin​
    14·1 answer
  • Which of the statements below is true?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!