1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horrorfan [7]
3 years ago
14

Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu

ter can become a zombie along with thousands of other computers that flood a victim's network and bring down servers. While the attack is going on, the botnet infects the network with spam, viruses, and malware.
What are the four simple rules of stopping botnets on your personal PCs?

What are some of the symptoms that would make you suspicious that your computer has been attacked?

What part of a security incident should be logged?
Computers and Technology
1 answer:
Virty [35]3 years ago
7 0

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

You might be interested in
1-5 Safety measures in the use of kitchen tools and equipment.​
gladu [14]

Answer:

Safety measures are as follows;

Explanation:

  • Hold the delicate instruments cautiously to use them.
  • Require appropriate use of the equipment in the kitchen.
  • Users should remove these defective instruments or discard of them.
  • During and before use, check that perhaps the resources that will be used are indeed safe.
  • In a cold and dry spot, all equipment must be kept.
4 0
3 years ago
The OnStar system allows Select one: a. a vehicle owner to initiate a conversation with an OnStar representative. b. the vehicle
Rzqust [24]

Answer:  e) a, b, and c

Explanation: OnStar system is the secondary service that is provided by the General Motor Corporation , who is the parent company of this system.The services like in-vehicle protection, diagnosing issues from distance emergency services, communication services based on subscriptions, turn by turn navigation etc.

Conversation started with OnStar member by vehicle owner is communication service in hands -free way, vehicle sending message to OnStar member after mishap/accident is type of emergency services and OnStar member putting off the gas pedal without the permission of driver of the the vehicle is also a protect service .Thus, all the given options are correct.

6 0
3 years ago
Write 4 types of viruses , explain them briefly.
wariber [46]

I can help with two.

Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

8 0
3 years ago
How can the font type of an existing style named No Spacing be changed?
OLga [1]

Manually change the font type of the style in any place in the document it has been applied, right-click, and select Styles and Update No Spacing to Match Selection.

<u>Explanation:</u>

Styles fonts can be modified directly from home tab by selecting style sheets and apply changes. User can also select existing styles and select save selection as new quick style. Once user selected they can either modify or create new style.

There multiple options are available. End user can select based or their requirements. There is option to do automatic update on styles fonts for open document.

In below screen there is following options, such as fonts, paragraph, tabs, border, language, frame, numbering, short keys, text effects.

User can select fonts and select no of spacing methods and apply the changes to all document or current documents.

6 0
3 years ago
Read 2 more answers
Which networking devices forward incoming data between computer networks
Gnoma [55]

Answer: C,D

Explanation:

Wireless routers are commonly found in homes -- they're the hardware devices that Internet service providers use to connect you to their cable or xDSL Internet network. A wireless router, also called a Wi-Fi router, combines the networking functions of a wireless access point and a router.

6 0
3 years ago
Read 2 more answers
Other questions:
  • In what ways do cameras allow us to see the world in ways that we could not with only our eyes?
    15·2 answers
  • I'm a number less then 40000.all my digits are multiples of 3.my first third a d fifth digits are the same both of my thousands
    10·1 answer
  • Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to
    7·1 answer
  • Working in a meat factory packaging and shipping the meat deliveries falls into which agricultural cluster?
    7·1 answer
  • Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. Which stage of t
    11·2 answers
  • Which of the following are common data types? Check all that apply.
    6·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • Within how many days can a deleted view be restored?
    6·1 answer
  • NEED HELP ASAP!!!
    10·1 answer
  • How did these social media platforms affect or change the way you communicate with other people?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!