1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
2 years ago
11

If you notice files being transferred to or from your computer a. Simply close the window c. Tell the lab instructor b. Open a n

ew Internet window d. Close the Internet session and tell the lab instructor Please select the best answer from the choices provided
Computers and Technology
2 answers:
a_sh-v [17]2 years ago
5 0

Answer:

The best answer is letter D.  

Explanation:

Downloading of files without your permission is a form of security threat and attack. You as unwilling victim will have your files and private information stolen.

One of the basics of internet security is to terminate any connection that you have in a network to stop the possible attack or threat. Worst case scenario is we can shut down our computers or devices or gadgets. But if we can just terminate the connection without performing a force shut down on the device, it is much better. This will give us more time to save what we are working on and to prevent losing important works or data. Terminating the connection from the network comes in various activities such as:  

*Disconnect from the internet - this is one of the most effective method. As most of the attacks are coming from external threats such a hacking.  

*Closing the browser - this could be helpful as well. Hackers are using browser to monitor their victims. And malwares and adwares are most active while we use browsers as they are embedded and using it to propagate to peform their activities.  

*Disconnect from the local network - if you have closed the internet connection and any active software that you are working on presently and the downloading of files still persists, probably the attack comes from your local network. You must close any connection that you have within the local network.

*Deleting the recent files you have downloaded - You must delete any recent files that you just downloaded from your email or from the internet. There might be malware embedded in the file. Malwares are used by hackers to get in to their victims computer without them knowing it.

Then after terminating all the connections, you must call on your Instructor's attention. He / She is the authority in charge and must be aware of the situation.

Contact [7]2 years ago
3 0

Answer:d. Close the Internet session and tell the lab instructor

Explanation:If you notice files being transferred to or from your computer it might be a malware attack in which a virus or worm is transferred to the host system in order to make copies of all the files present in the host system and these are transferred to the attacker through internet.

You might be interested in
Which of these port transmits digital video
DaniilM [7]

Answer:

uhm

Explanation:

theres nothing there

7 0
2 years ago
Read 2 more answers
In 2000, operating a basic internet application cost businesses approximately _____ per month. In mid-2016, operating the same a
anyanavicka [17]

Answer:

In 2000, a basic internet application cost businesses approximately $150,000 per month. In mid-2016, operating the same application in Amazon's cloud cost approximately $1,000 per month.

Explanation:

The role of cloud services cannot be overemphasized. Providing Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service (SaaS) cost a lot as there were very few cloud service providers and most services were yet to be integrated to the cloud.

But as at 2016, the cost on applications dropped as we have experienced an exponential growth in cloud services and applications, we now have Internet of Things (IoT) and other cloud infrastructure.

4 0
3 years ago
Most IT security threats originate with hackers.<br> Question 3 options:<br> True<br> False
kap26 [50]
The answer is True they do originate with hackers
6 0
3 years ago
Ximena noticed that Sofia had created a network bridge on her new laptop between the unsecured wireless network and the organiza
ratelena [41]

Answer:

A bridge could permit access to the secure wired network from the unsecured wireless network

Explanation:

A bridge is connecting device in networking that connects two different network devices. This device is suitable to connect a secure network with an unsecured network.

8 0
3 years ago
Productivity, rework, and technology impact are examples of which kind of software metric?
fgiga [73]

The correct answer should be process type of software metric. The process metrics are used to help in strategic decision making. The processes such as work products delivery, expended human hours and conformance to quality and schedule are all metrics in the process domain.

6 0
3 years ago
Other questions:
  • In Word, tables can be styled much like text can.<br> True<br> False
    6·1 answer
  • To quickly modify fonts, colors, and effects on a slide, a user can modify the _____. (Microsoft PowerPoint)
    11·1 answer
  • Why is it important to begin development of a software solution with a programming design in place? A programming design summari
    11·2 answers
  • The term ________ refers to fluid flow back to the pan to empty or drain a circuit.
    5·1 answer
  • Create a SavingsAccount class. Use a static data member annualInterestRate to store the annual interest rate for each of the sav
    10·1 answer
  • 14. The Internet may best be compared to a/an
    13·2 answers
  • which three objects can be linked or embedded in a word document? A. worksheets, margins, colors B. charts, worksheets, images C
    7·1 answer
  • Repeated execution of a set of programming statements is called repetitive execution.
    7·1 answer
  • What are the benefits of computer literacy?
    10·1 answer
  • Vector images take up much less space when saved to a computer or storage device because computers and storage devices just need
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!