1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
13

Martha has been appointed as the Data Security Manager of her organization. The company wants her to develop a customized app to

remove viruses from the infected systems without connecting to the network. What type of app should she focus on developing
Computers and Technology
1 answer:
vodomira [7]3 years ago
5 0

Answer:

A device management portable app

Explanation:

A device management portable application (portable app) is an app which is designed not to use installer in which all the files that are required to enable the app run effectively are often in a single folder which can be put anywhere on the system and can easily be moved from one place to another and it also enable the remover of viruses from an infected systems without connecting to the network.

A portable app makes it easier to transfer program with the user's preferences and data between different system and it does not have a configuration option.

Therefore Martha should she focus on developing A DEVICE MANAGEMENT PORTABLE APP

You might be interested in
How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
Alisiya [41]
Go to file>export as and it will allow you to change it to other files.
7 0
3 years ago
Read 2 more answers
What is required for real-time surveillance of a suspects computer activity?/p Group of answer choices a. Blocking data transmis
Hitman42 [59]

Answer:

c  Preventing data transmissions between a suspect’s computer and a network server

Explanation:

3 0
3 years ago
For some people , alcohol can cause an uncontrollable blank of the eyes , making good vision almost impossible
ss7ja [257]
The statement above wil be completed.

For some people, alcohol can cause an uncontrollable vibration to the eyes, making good vision almost impossible. This vibration is called nystagmus or the eyes getting dizzy and shaky. This nystagmus occurs when a person drinks too much and reaches his limit in alcohol intake.
7 0
3 years ago
There are many different types of documents that are used to convey information in the business world-letters and
Savatey [412]
I don’t know what the answer is I wish I could help
4 0
4 years ago
A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an
Tom [10]

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

5 0
3 years ago
Other questions:
  • What software refers to the on authorized and illegal duplication or sale of software
    10·1 answer
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • What does zooming do? A. Changes your view of the Frame Editor to be closer or farther away B. Changes your view of the Event Ed
    12·1 answer
  • A network protocol is a set of rules defining communication between two devices. True False
    8·2 answers
  • Create a datafile called superheroes.dat using any text-based editor, and enter at least three records storing superheroes’ name
    9·1 answer
  • Which of the following is not true about VOIP?
    9·1 answer
  • C program To print odd numbers from 15 to 1 ​
    8·1 answer
  • Which are examples of basic text structures? Check all that apply.
    8·2 answers
  • a matched-pairs t-test is not an appropriate way to analyze data consisting of which of the following?
    11·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!