1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
12

Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keys

trokes to a third party. What information security property is this malware attacking?
Computers and Technology
1 answer:
Bond [772]3 years ago
7 0

Mostly the spyware and malware protection for desktop and laptop or workstations are to protected with anti-virus regular updates. All workstation or desktop or laptops are to updated operating systems patches.

If any operating systems patched update to be schedule and checked regularly. Schedule scanning by virus scanner to be made for desktop and laptop or workstations in regular interval basis

There are third parties tools such as malware and ADWCLEANER are also available free scanner software through internet where end user can download and scanner so software will clean the malware.

Mostly end user do mistake keep the files in desktop. Most of the malware software will affect the desktop folder only.

It will also affect c:\users folder and register enter keys.

You might be interested in
what has become an established maritime commerce Center and one of the largest cities in the United states ​
coldgirl [10]

Easy! That would be the city of San Francisco!

7 0
2 years ago
How many terabytes is a 128 gigabyte SD memory card
Maksim231197 [3]

Answer:

this would be .128 terabytes

Explanation:

This would be since for a whole terabyte you need 1000 gigabytes every 1000 gigabytes is a terabyte for example let’s say you have 5250 gigabytes you would have 5.250 terabytes that simple hope this helped!

4 0
2 years ago
Read 2 more answers
ANSWER ASAP GIVING BRAINIEST FIVE STAR AND HEART!
scoundrel [369]

A formula is statement written by the user to be calculated. Formulas can be as simple or as complex as the user wants. A formula can contain values, references to cells, defined names, and functions.

All formulas must start with the equals sign. =1+2+3

A function is a piece of code designed to calculate specific values and are used inside formulas. Functions to sum values, calculate a trigonometric cosine, and to calculate the current time are built into excel. Additional functions can be defined using Visual Basic.

Functions are typed alongside parenthesizes, where in the arguments if any are listed in between. To use functions in a formula, for example

=COS(3.14) will return the calculated cosine. =NOW() returns the current time. =SUM(1+2+3) *2 will multiply the sum by 2Explanation hope it helps

8 0
3 years ago
Read 2 more answers
Write a SELECT statement that returns the same result set as this SELECT statement. Substitute a subquery in a WHERE clause for
AleksAgata [21]

Answer:

SELECT DISTINCT VendorName FROM Vendors

WHERE VendorName= ANY (SELECT VendorName FROM Vendors JOIN Invoices ON Vendors.VendorID = Invoices.VendorID) ORDER BY VendorName;

Explanation:

All bold faced words are sql keywords for different purposes. The subquery return the all values which matches the join condition  and main query will choose only distinct values and make them in order of VendorName.

There many other queries also return the same result as returned by given query.

8 0
2 years ago
ÍS THERE ANY TECH GUY OR SOMEONE WHO UNDESTAND ABOUT UNINSTALLING?
marysya [2.9K]
Well, dont know ;-: PROBLEM?
6 0
3 years ago
Other questions:
  • To keep your emails concise and to the point
    13·1 answer
  • Discuss Hashing and how it is utilized within the IT industry. Also, discuss how Hashing can improve our sorting and searching r
    12·1 answer
  • User accounts will be locked out after authentication is attempted
    7·1 answer
  • What is the purpose of a title slide on power point
    14·2 answers
  • Commercial applications are never free<br><br> -True<br><br> -False
    9·1 answer
  • The number of bits per pixel is called what
    7·1 answer
  • Which of the following is NOT considered a step in the problem solving process. A Try B Discover C Prepare D Define
    12·1 answer
  • Your boss bought a new printer with a USB 3.0 port, and it came with a USB 3.0 cable. Your boss asks you:
    7·2 answers
  • What does digital mean, in the term of computer science.
    11·1 answer
  • PlanthelogicforLungi’sapplicationusingpseudocode.Thelogicneedstosatisfythefollowingneeds:TheapplicationwillneedtoallowLungitoen
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!