1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
9

What does a virus do to a computer? How can it be fixed?

Computers and Technology
1 answer:
miv72 [106K]3 years ago
4 0
A virus can do many things from burn up your hard drive to just annoy you with ads. the best thing you can do if you think you have one is take it to a professional
You might be interested in
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote
kramer

Answer:

<em>Source port numbers and Destination </em>

Explanation:

Sockets are also <em>known as the source and destination IP addresses are combined with the  source and destination port numbers.  </em>

The socket is used to define the client's request for server and network.  

Thousands of hosts are communicating with millions of separate servers every day.

5 0
4 years ago
it is a program a personal computer microprocessor uses to get the computer system started after you turn it on​
Fofino [41]

Explanation:

please repeat your question

5 0
3 years ago
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
Naya [18.7K]

Answer:

a. file-naming conventions

Explanation:

File names need to follow certain criteria and constraints. Examples include:

  • File names must not start with special symbols.
  • File names can consist of letters,digits and special characters such as _.
  • File name can contain an extension after a dot sign.
  • File names must not be duplicates of an existing file.

Such constraints form part of file-naming conventions.

  • file-path represents the complete path to the file in the directory structure.
  • disk partition segments a hard disk into multiple volumes.
  • file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
6 0
3 years ago
Literally not even a true question, I just want to know
german
I’m here because of k12
3 0
3 years ago
Read 2 more answers
Other questions:
  • These commands are established by combatant commanders when authorized by the Secretary of Defense through the Chairman of the J
    5·1 answer
  • A field that will always have a unique value is
    15·2 answers
  • (08.03 MC) Maya is a senior in high school and would like to pursue a career in web design. She needs more information about wha
    11·2 answers
  • A farmer sells tomatoes. For some reason, the farm obeys mechanical laws of fate.
    5·1 answer
  • Select below the Active Directory server role that provides the functions of Active Directory without the requirements of forest
    14·1 answer
  • A cable that connects the computer to the printer is an example of<br> A.hardware<br> B.software
    13·2 answers
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • State three reasons why users attach speakers to their computer​
    8·1 answer
  • Write a program that stores the maximum of three values. The values are stored in $s0, $s1, and $s2. Store the result in $s3. No
    6·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!