1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
11

If you notice files being transferred to or from your computer a. Simply close the window c. Tell the lab instructor b. Open a n

ew Internet window d. Close the Internet session and tell the lab instructor Please select the best answer from the choices provided
Computers and Technology
2 answers:
a_sh-v [17]3 years ago
5 0

Answer:

The best answer is letter D.  

Explanation:

Downloading of files without your permission is a form of security threat and attack. You as unwilling victim will have your files and private information stolen.

One of the basics of internet security is to terminate any connection that you have in a network to stop the possible attack or threat. Worst case scenario is we can shut down our computers or devices or gadgets. But if we can just terminate the connection without performing a force shut down on the device, it is much better. This will give us more time to save what we are working on and to prevent losing important works or data. Terminating the connection from the network comes in various activities such as:  

*Disconnect from the internet - this is one of the most effective method. As most of the attacks are coming from external threats such a hacking.  

*Closing the browser - this could be helpful as well. Hackers are using browser to monitor their victims. And malwares and adwares are most active while we use browsers as they are embedded and using it to propagate to peform their activities.  

*Disconnect from the local network - if you have closed the internet connection and any active software that you are working on presently and the downloading of files still persists, probably the attack comes from your local network. You must close any connection that you have within the local network.

*Deleting the recent files you have downloaded - You must delete any recent files that you just downloaded from your email or from the internet. There might be malware embedded in the file. Malwares are used by hackers to get in to their victims computer without them knowing it.

Then after terminating all the connections, you must call on your Instructor's attention. He / She is the authority in charge and must be aware of the situation.

Contact [7]3 years ago
3 0

Answer:d. Close the Internet session and tell the lab instructor

Explanation:If you notice files being transferred to or from your computer it might be a malware attack in which a virus or worm is transferred to the host system in order to make copies of all the files present in the host system and these are transferred to the attacker through internet.

You might be interested in
Cual es la relacion existe entre TENGNOLOGIA y la PRODUCCION DE ENERGIA
andrezito [222]

Answer:

la tecnología tiene energía para hacer que los dispositivos funcionen, que es como los humanos y la energía. Los seres humanos usan energía, ¡la tecnología también usa energía!

Explanation:

ps. this is in english, my home language

technology has energy to make devices work, which is like humans and energy. human beings use energy, technology uses energy too!

5 0
3 years ago
The range A2:B4 has how many cells?<br><br> Answers:<br> 2,4,6,8
mylen [45]
6 cells because you have to drag and it becomes six cells .

8 0
3 years ago
Read 2 more answers
One of the files you should now have in your fileAsst directory is TweedleDee/hatter.txt. Suppose that you wished to copy that f
Paha777 [63]

Answer:

cp /path/to/source.txt .

is the general format of copying a file to the current directory

cp ~/UnixCourse/fileAsst/TweedleDee/hatter.txt .

You can refer to the current directory with a dot (.)

Explanation:

First, we would like to delete all files in our current directory (commandsAsst directory). To delete the files inside the directory, we would run the following command:

rm -r commandsAsst/*

This command delete the files recursively. Usually, the command for deleting is rm -r. The operator * run rm -r on every file or directory within commandsAsst.

5 0
3 years ago
What does a theme contain?
meriva

A theme is a set of colors, fonts, effects, and more that can be applied to your entire presentation to give it a consistent, professional look.

4 0
3 years ago
Read 2 more answers
What program we write for nested if in c++ to print something after else part but before inner if else
alina1380 [7]

Answer:

if(condition){

}

else  {

  // something we want to print

  if(condition) {

     // ...

  }

  else {

     // ...

  }

}

Explanation:

Create code blocks using curly braces { ... }.

Use proper indentation to visibly make it clear where code blocks start and end.

4 0
3 years ago
Other questions:
  • To pinpoint an earthquake's location, scientists need information from how many seismometers?
    8·1 answer
  • What kind of battery does a dji spark have?
    12·1 answer
  • Joe wants to use pictures from the Internet in a word processing program. Which is the most important aspect that Joe should con
    8·2 answers
  • 11. What is the hexadecimal representation of each of the following binary numbers? a. 1100 1111 0101 0111
    6·1 answer
  • What types of storage can be used to access your data on another computer?
    10·2 answers
  • My mom hid my laptop and now I can't find it​
    9·1 answer
  • PLEASEEE HELPPP im gonna cry
    11·2 answers
  • What is the different between the patch Tool and the Headling Brush tool?​
    5·1 answer
  • The different languages that follow specific RULES. These languages use commands
    9·1 answer
  • A computer professional's job involves analyzing computer systems for
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!