1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
8

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled sever

al browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point. What should Jackson do to complete the malware removal process?
A. Educate the end user.
B. Document the problem.
C. Recover the user data.
D. Reinstall Windows.
Computers and Technology
1 answer:
nadezda [96]3 years ago
8 0

Answer:

C. Recover the user data.

Explanation:

Because a virus delete user data

You might be interested in
What are the consequences of having unprotected Linux operating systems installed on embedded systems?
Gennadij [26K]

Answer:

highly venerable to external attacks

Explanation:

Embedded systems are the type of computer systems that are specially designed having hardware and software components plus programmable  capabilities embedded into the hardware itself.

These computer systems are motorized by dedicated computer hardware chips made by companies such as Broadcom, Qualcomm, and Marvell. These chips are cheap which also means that they’re highly vulnerable, and the profit margins slim. They normally put a version of the Linux operating system onto the chips, lumping it up with some other bunch of open-source and proprietary components and drivers. With little or no technical engineering work before shipping, and there's little enticement to update their "board support package" until there’s probably a very good reason for it.

6 0
3 years ago
Please!! I need help, this is due by tonight!!!
lyudmila [28]

Answer:

sorry if it is too late but I think it is d

Explanation:

4 0
3 years ago
Write a Python class, Flower, that has three instance variables of type str, int, and float, that respectively represent the nam
MA_775_DIABLO [31]

Answer:

The python class is shown on the first uploaded image

Explanation:

6 0
3 years ago
Which e-mail netiquette rules did the student break? check all that apply.
abruzzese [7]

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

<h3>What are the email netiquette rules?</h3>

This is known to be the rules for email etiquette and they are:

  • The use of a clear, professional subject words.
  • Always Proofread all email that you send.
  • Compose the email before entering the recipient email address and others.

The e-mail netiquette rules that the student broke are:

  • Always proofread before sending.
  • Identify yourself by name.
  • Do not reveal personal information.

Learn more about etiquette from

brainly.com/question/2528165

#SPJ1

6 0
2 years ago
Nous aimons regarder des bonnes émissions à la télé. Nous les aimons regarder. Nous aimons regarder les. Nous l'aimons regarder.
Nitella [24]
Hi,

<span>Nous aimons regarder des bonnes émissions à la télé.
 Nous aimons les regarder. </span>
6 0
3 years ago
Other questions:
  • Before starting a spreadsheet, it is smarter to plan ahead and think through the design. true or false
    13·1 answer
  • Which statement compares the copy and cut commands?
    5·2 answers
  • Is it bad to leave external hard drive on for hours
    7·1 answer
  • In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will
    8·1 answer
  • "in program arrays12.java a swap method is called. does the swap method exchange parameter values x and y?"
    11·1 answer
  • Is the following statement TRUE or FALSE?
    9·1 answer
  • The OnStar system allows Select one: a. a vehicle owner to initiate a conversation with an OnStar representative. b. the vehicle
    8·1 answer
  • 1. How many bits would you need to address a 2M × 32 memory if:
    8·1 answer
  • What lets you do many things, like write book reports and stories?
    14·2 answers
  • In his article, “How to Publish Without Perishing,” what does James Gleick believe most people do when they really read a book?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!