1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
9

Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea

rch a new product when his computer emitted an alarm accompanied by a warning that a site had blocked his computer and that information was being stolen from the computer. The message included a phone number and a note to call the number within five minutes so that engineers could walk him through the removal process. ​ What has happened to the customer computer?
Computers and Technology
1 answer:
marysya [2.9K]3 years ago
5 0

Answer:

The customer's browser has been hijacked by some attackers may be.

Explanation:

According to customer's explanation there is  possibility that that his data may be stolen and he has to disconnect computer from network and then call given number in order to get back his data.

You might be interested in
How do Hlookup and Vlookup differ?
german

HLOOKUP performs the same function as VLOOKUP, but looks up data that has been formatted by rows. HLOOKUP searches for a value in the top row of a table, and then returns a value in the same column from a row you specify in the table or array

6 0
3 years ago
Read 2 more answers
If a protocol is routable which tcp/ip layer does it operate at\
ikadub [295]
Layer 3, the Network Layer, just like the OSI model.
6 0
3 years ago
Directions
DanielleElmas [232]

Answer:

is he project for me

Explanation:

3 0
3 years ago
What is information systems​
maxonik [38]

brainly.com/question/10887381

Answer:You need 7 bits to encode everything that could be typed on this keyboard.

Explanation:

The encoding of the QWERTY keyboard is based on the extended ASCII encoding. The "ASCII" code was created by the "American standards association" in 1963.The acronym of “American Standard Code for Information Interchange” is ASCII. ASCII is a 7-bit  code.

Further Explanation:

The QWERTY keyboard is the standard computer and typewriter keyboard design for Latin-script alphabets. The first six letters of the keyboard's upper row indicate its name.  Christopher Latham Sholes designed the layout of the keyboard for his "Type-Writer".  It was first mass-produced in 1874.

In QWERTY keyboard, extended American Standard for Information Interchange (ASCII) method is used for characters encoding. Alphabetical order of English language is the base of ASCII method of characters encoding.  

Learn More:

Learn more about QWERTY keyboard: brainly.com/question/649081; Answered by: Jessusulas

Learn more about ASCII: brainly.com/question/7851735; Answered by: LearnGrow

Keywords:

QWERTY keyboard, The encoding of the QWERTY keyboard, American Standard for Information Interchange, ASCII

6 0
3 years ago
Quickbooks online accountant firm users can use the quickbooks online advanced desktop app to access what types of client subscr
Leokris [45]

The type of the client subscription used is paid subscription.

<h3>What is Paid Subscription? </h3>

Paid Subscription refers to the payment made already on the product purchased or the services received. It is a kind of the recurring payment whose transactions repeat after a regular basis.

If the customer continue to receive  the service then he or she has to pay the subscription.

After paying the membership costs, customers of Quickbooks Online for accountancy firms can access the Quickbooks Online Advanced desktop application.

Learn more about Paid Subscription here:

brainly.com/question/13508895

#SPJ1

5 0
2 years ago
Other questions:
  • A(n) _____ is the highest educational degree available at a community college. master bachelor associate specialist
    13·2 answers
  • ____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
    11·1 answer
  • Correspondence involves verbal communication. True False
    6·2 answers
  • I'd like to edit a picture so that I can remove the background behind an object and have it replaced with a transparent backgrou
    13·2 answers
  • Concept about borderless classroom because of technology​
    9·1 answer
  • Public relations strives to foster goodwill between a client and a audience ​
    8·1 answer
  • If you had an idea for a new software company, what would be the best approach to help make it a successful business? develop a
    5·2 answers
  • You are troubleshooting a client connectivity problem on an Ethernet network. The client system has intermittent connectivity to
    9·1 answer
  • Internal exception java.net.socketexception connection reset 1.18
    8·2 answers
  • Under what scenarios can we clear the NVRAM by moving the PSWD jumper to the RTCRST<br> pins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!