1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
8

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled sever

al browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process?
A. Educate the end user.
B. Document the problem.
C. Recover the user data.
D. Reinstall Windows.
Computers and Technology
1 answer:
nadezda [96]3 years ago
8 0

Answer:

C. Recover the user data.

Explanation:

Because a virus delete user data

You might be interested in
Choose the correct term to complete the sentence.
fgiga [73]

Answer:

Answer is Local

Explanation:

7 0
3 years ago
Read 2 more answers
When working with a spreadsheet, data analysts can use the _____ function to locate specific characters in a string.
jonny [76]

When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.

<h3>What is the CLEAN Function? </h3>

The CLEAN Function is known to be a tool that is often categorized in the Excel Text functions.

Note that this function tends to delete or remove any kind of non-printable characters from any specified or given text.

Note that As financial analysts, people tend to often import data from a lot of sources and the CLEAN function can help to delete nonprintable characters.

Hence, When working with a spreadsheet, data analysts can use the CLEAN function to locate specific characters in a string.

Learn more about spreadsheet from

brainly.com/question/4965119

#SPJ1

6 0
2 years ago
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
nikklg [1K]

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

4 0
3 years ago
Program your own file lab7.cpp in which your main() function will test the new data structure. The main() function, Declares an
Stella [2.4K]
Is this a question or just something up here just to be here
3 0
3 years ago
Which function converts the user's input to a number with a decimal?
levacccp [35]

Answer:

Explanation: integer is the meaning of int() if you payed attention to programming class, int() would be a WHOLE number and not a decimal number, 2nd of all, a decimal number would be float() so the answer is int() hope i helped!

Explanation:

hope this helped good luck

4 0
3 years ago
Other questions:
  • If you are asked to bring in agile way of working into the way a meeting runs, which one among the listed options will you imple
    11·1 answer
  • How do you subscribe to Darthmaul Productions on YT?
    13·1 answer
  • Heavenly bodies formed because of gravity<br><br> T or F
    10·1 answer
  • Chole enjoys her math classes, and she would like to find a career that will allow her to continue use her math skillls which ca
    10·1 answer
  • What software development model focuses on improving the product in small steps each time through the cycle?
    14·2 answers
  • You would like to emphasize certain key terms on a slide with a bold format. Which slide element should you modify to provide th
    15·2 answers
  • Why do some people have random numbers as their usernames?
    9·2 answers
  • What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digita
    5·1 answer
  • How can you have internet without subscribing to cable?
    13·1 answer
  • What action should you take if you become aware that sensitive compartmented information has been compromised
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!