1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
3 years ago
9

Why is my computer getting slower and slower? What can i do without buying a virus scanner?

Computers and Technology
2 answers:
NeTakaya3 years ago
7 0
It could be that your computer is simply getting older and more worn out, I suggest downloading MalwareBytes, it's a free anti-virus software that I use personally.
WARRIOR [948]3 years ago
4 0
You're memory might be full try some stuff clean it and you dont have to buy scanner there's free ones out that work
You might be interested in
Ms. Myers commented that _____ she slept in at the hotel was better than _____ she slept in at home.
nirvana33 [79]
The bed/ the bed is the answer
6 0
3 years ago
2.
inn [45]

Answer:

True

Explanation:

Readability is how easy it is to read words, phrases, blocks of copy such as a book, a web page or an article. Legibility is a measure of how easy it is to distinguish one letter from another in a particular typeface.

Your welcome

5 0
3 years ago
Madison works for Google as an Ethical Hacker. Madison main job responsibility is
Ivenika [448]

Answer:

to evaluate the security and identify vulnerabilities of a business

Explanation:

Madison is an ethical hacker (white hat hacker), meaning she is hired by companies to make sure that "evil" hackers (black hat hackers) can't hack into their websites.

7 0
3 years ago
Read 2 more answers
Definition of the term social factor and explain why texting while driving can be classified as a social factor causing accident
sergij07 [2.7K]
Social factor - Something that affects you!
Texting and driving is classified as a social factor because your phone is the reason why you crashed your car.
8 0
3 years ago
is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
Rina8888 [55]

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

3 0
3 years ago
Other questions:
  • What symbol following a menu command lets you know that a dialog box will be displayed?
    14·1 answer
  • Briefly explain five measures you have undertaken to protect your confidential
    12·1 answer
  • Select the information protection item that ensures that information is correct and that no unauthorized person or malicious sof
    9·1 answer
  • A computer with a frequency 2 GHZ and its average cycle per instruction is 2. what is the MIPS of the computer?
    6·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • What features are offered by most of the email programs with for receiving and sending messages?
    10·1 answer
  • Write a program called DeliveryCharges for the package delivery service in Exercise 4. The program should again use an array tha
    9·1 answer
  • The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify phys
    15·1 answer
  • Explain how to utilize the computer in rooms management.​
    13·1 answer
  • A mobile phone app asks the user to point the phone's camera at a room and then applies the phone's lidar scanning function. wha
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!