1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anzhelika [568]
3 years ago
11

If you notice files being transferred to or from your computer a. Simply close the window c. Tell the lab instructor b. Open a n

ew Internet window d. Close the Internet session and tell the lab instructor Please select the best answer from the choices provided
Computers and Technology
2 answers:
a_sh-v [17]3 years ago
5 0

Answer:

The best answer is letter D.  

Explanation:

Downloading of files without your permission is a form of security threat and attack. You as unwilling victim will have your files and private information stolen.

One of the basics of internet security is to terminate any connection that you have in a network to stop the possible attack or threat. Worst case scenario is we can shut down our computers or devices or gadgets. But if we can just terminate the connection without performing a force shut down on the device, it is much better. This will give us more time to save what we are working on and to prevent losing important works or data. Terminating the connection from the network comes in various activities such as:  

*Disconnect from the internet - this is one of the most effective method. As most of the attacks are coming from external threats such a hacking.  

*Closing the browser - this could be helpful as well. Hackers are using browser to monitor their victims. And malwares and adwares are most active while we use browsers as they are embedded and using it to propagate to peform their activities.  

*Disconnect from the local network - if you have closed the internet connection and any active software that you are working on presently and the downloading of files still persists, probably the attack comes from your local network. You must close any connection that you have within the local network.

*Deleting the recent files you have downloaded - You must delete any recent files that you just downloaded from your email or from the internet. There might be malware embedded in the file. Malwares are used by hackers to get in to their victims computer without them knowing it.

Then after terminating all the connections, you must call on your Instructor's attention. He / She is the authority in charge and must be aware of the situation.

Contact [7]3 years ago
3 0

Answer:d. Close the Internet session and tell the lab instructor

Explanation:If you notice files being transferred to or from your computer it might be a malware attack in which a virus or worm is transferred to the host system in order to make copies of all the files present in the host system and these are transferred to the attacker through internet.

You might be interested in
What is the average time a caller waits for an operator to answer?
kaheart [24]
3-4 minutes is about right is say
7 0
3 years ago
"You have a user who needs to keep desktop devices such as keyboard, monitor, and mouse permanently connected so that they can b
svet-max [94.6K]

Answer:

Docking Station is the correct answer of the following question.

Explanation:

A docking station is a technology system that is able to communicate capacities touchscreens with the other machines with few or no work.

The docking station is a system connecting a machine to many devices.

  • The docking station lets you attach to gadgets you have not been able to use in the future.
  • Not always connected with machines are docking station items such as sloped-panel displays and interchangeable lens cameras.
8 0
3 years ago
4. This is considered to be short term memory because it only holds programs
9966 [12]

Answer:

RAM

Explanation:

RAM or Random Access Memory only holds programs which are currently running

8 0
3 years ago
How can u tell which component react is large.
garri49 [273]

Answer:

So, if you check the contents of GridComponent.js you'll see that React is inside. In your case, this GridComponent.js is your "bundled file" (it will contain all the dependencies that you've imported). That's why it seems to be "large", because this file contains your component and react itself

Explanation:

8 0
3 years ago
What is pure substance ​
nlexa [21]

Answer:

i don't know

Explanation:

I don't understand

4 0
2 years ago
Other questions:
  • Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
    15·1 answer
  • Binary search requires that the data to search be in order.<br> True or false
    13·1 answer
  • The _______ has shortcuts to commonly used commands
    8·2 answers
  • The type of operating system best suited to controlling a massive multiplayer online game is _____.
    15·1 answer
  • To move from layout view to form view, tap or click the _____ button on the access status bar.
    15·1 answer
  • How do you compare text on different pages of a document?
    14·1 answer
  • Explain what happens if you try to open a file for reading that does not exist.
    10·1 answer
  • When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
    14·1 answer
  • Big data are used to _____. Select 3 options.
    5·1 answer
  • Where does Reiner take eren after they have a fight?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!