1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
12

Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he

r antivirus program failed. When she checked the update history, she discovered that the program had not been updated for two weeks. She restarted her computer and noticed that a file she was working on was no longer available. She also noticed that the network connection was sending data, even though she does not have an internet browser or any other user initiated network connection open. ​ What should Jannette do first on her computer?
Computers and Technology
2 answers:
algol [13]3 years ago
4 0

Answer:

A. Run anti-malware program.

B. Roll back to a previous date.

C. Quarantine the system.

D. Remediate the infected system.

E. Get a VPN

Explanation:

Marysya12 [62]3 years ago
3 0

Answer: ur never going to get your answer!!!!

ExpElanation: hahahahaha ( pls 5 star pls pls. Shhhh)

You might be interested in
Which statement best describes the Tell Me feature in PowerPoint 2016?
Bumek [7]

A statement best describes the Tell Me feature in PowerPoint 2016 is that: D. it opens a search field that can be used to look up old versions of presentations.

<h3>What is PowerPoint 2016?</h3>

PowerPoint 2016 refers to a software application that was designed and developed by Microsoft Inc., so as to avail its end users the ability to create various slides which can be used during a presentation.

In PowerPoint 2016, the Tell Me feature is a tool which opens a search field that can be used by end users to look up or search old versions of presentations.

Read more on PowerPoint here: brainly.com/question/26404012

#SPJ1

6 0
2 years ago
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.
fgiga [73]
Web-centric systems
3 0
3 years ago
A _______ read inputs the first data item from a file. It typically appears immediately before the loop that processes the data
Evgesh-ka [11]

Answer:

the answer is priming read

Explanation:

hope it helps u

8 0
3 years ago
in triangle abc the value of cot a by 2 into cot B by 2 minus 1 whole divided by cot a by 2 into cot B by 2 is equal to​
netineya [11]

Answer: 2 + 2 is 4 minus 1 thats 3 quick mafs

Explanation:

8 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
Other questions:
  • To play game, go inside the Grand Theft Auto V folder and right click and runGTAVLauncher as administrator.If you get any missin
    5·1 answer
  • Which of the following is something that all computer models use in their calculations?
    12·1 answer
  • he fundamental building block in every Hypertext Markup Language (HTML) document is the _____ tag, which marks a component in th
    7·1 answer
  • Write a Python program to convert the characters to lowercase in a string
    6·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • What does “human-like” mean when we are talking about a machine?
    7·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • What is lossless compression
    6·2 answers
  • What problems do you see in the process of transacting business online
    10·1 answer
  • Mechanisms that can be used to rescue accident victims
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!