1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
10

What are 7 good facts on Computer Viruses?

Computers and Technology
1 answer:
tia_tia [17]3 years ago
4 0
<u><em>Viruses,A tiny program that hacks a computer </em></u>
<u><em>Steals information and personal data.It can disable your laptop.Viruses can be found in malicious sites.Criminals share these viruses to steal data from others.With a firewall,Hackers will be detected.</em></u>
<u><em> </em></u>

<u><em>The general consensus is that there are no good viruses.</em></u>



You might be interested in
Which of the following is not a negative environmental effect associated with cars? A. Deforestation B. Roadside litter C. Toxic
777dan777 [17]

Answer:

The answer to this question is the option "C".

Explanation:

In this question, the answer is option C. Which is river toxic pollution. This pollution is also known as Kim Kim river toxic pollution. In 2019 this pollution occurred in the water caused by unauthorized chemical garbage dumping in the river in Malaysia. The unauthorized dumping released poisonous fumes, affecting six thousand people are hospitalized in 2,775.

8 0
3 years ago
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
Which of the following is a preferable method to secure wireless access in a SOHO?
NARA [144]
Use a Ghost program follow throught with 2hyttlg5:6\:56
6 0
3 years ago
Select the correct answer.
Andrei [34K]

Answer: The answer is C

Explanation: When it comes to research papers your topic shouldnt be too broad. Your topic should be broad enough you can find a good amount of information but not too focused that you can't find any information.

7 0
2 years ago
Device management is the process of managing
faltersainse [42]
Device management is the process of managing the devices in your computer. In your computer you have the so-called device manager, in which all the drivers of your devices are installed. Device Manager allows you to monitor and manage each of its devices. You can also uninstall and update your devices in device manager. And the process of doing it is called device management. It is very simple to do this kind of stuffs as long you are familiar with your devices like mouse, printer, keyboard, etc.
8 0
3 years ago
Other questions:
  • Laurence Sims owns a football team that plays its home games in City Stadium. To increase revenue, he is offering a sponsorship
    14·1 answer
  • What are some causes of the number of bytes on the wire exceeding the number of bytes being captured?
    6·2 answers
  • What is Administrator windows 10
    8·1 answer
  • 14. The Internet may best be compared to a/an
    13·2 answers
  • Which are among the ways you can use bitlocker encryption? (choose all that apply?
    5·1 answer
  • A network administrator is configuring the triggering mechanism for the network-based IPS by defining a pattern of web surfing a
    10·2 answers
  • What is ‘Software Testing’?
    13·1 answer
  • Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use? JavaScript H
    15·2 answers
  • Computer spreadsheet is a grid of​
    9·1 answer
  • Help ne please!! Even if I press 3 times it doenst work.. when I try to turn it off either. Any suggestions? (using ipad)​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!