1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
3 years ago
11

A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call

ed account.doC) The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?A) Your user inadvertently downloaded a macro virus using IM.B) Your user may have downloaded a rootkit.C) Your user may have accidently changed a setting on the system.D) The system is unstable due to the use of IM.
Computers and Technology
1 answer:
solniwko [45]3 years ago
7 0

Answer: A) Your user inadvertently downloaded a macro virus using IM

Explanation:

As the user has downloaded a file from a prospective client ad the file was account.doc, but since then the system of the user has not been behaving normally so the most possible reason could have been the user has inadvertently downloaded a micro virus using the IM. These micro virus are invisible programs which can be transferred inadvertently from one user to another another. They can be transported over the network.

Option b is not correct as the user has not download a rootkit as it would require special privileges.

Option c is not correct as the user upon changing a setting in the system can reset it.

Option d is not correct as using the IM is not unstable to the system.

So, the correct option is A.

You might be interested in
Que cambiaría personalmente en esos momentos de cuarentena​
Natali5045456 [20]
No poder salir sin estar con la duda de que si una persona con la que estas cercas tendría el virus , no poder visitar a ciertas personas
6 0
3 years ago
The National Institute of Standards and Technology (NIST) guidelines list four different states a mobile device can be in when y
Ahat [919]

Answer:

quiescent

Explanation:

The National Institute of Standards and Technology (NIST) guidelines list four different states a mobile device can be in when you extract data. The quiescent mode is a dormant mode that conserves battery life while maintaining user data and performing other background functions.

4 0
3 years ago
A network system administrator would typically be responsible for which of the following duties?
EleoNora [17]

Answer:

A) Maintaining the shared connections between offices

Explanation:

Plz mark brainliest

3 0
3 years ago
Read 2 more answers
Everybody at a company is assigned a unique 9 digit ID. How many unique IDs exist?
Brut [27]
If you include all zeroes, then it should be 1,000,000,000. Otherwise it’s 999,999,999.

Think of how between 0-9 theres 10 numbers, and use that logic towards 000000000-999999999
3 0
3 years ago
Consider the following code example:
yKpoI14uk [10]

Answer:

The number of invoices for each vendor that have a larger balance due than the average balance due for all invoices.

Explanation:

This part of the code below

WHERE InvoiceTotal - PaymentTotal - CreditTotal >

(SELECT AVG (InvoiceTotal - PaymentTotal- CreditTotal)

FROM Invoices)

gives the condition to pick the invoices with balance that are greater than the average balance for all invoice.

This part of the code below

GROUP BY VendorName

ORDER BY BalanceDue DESC;

then enables the program to group the result of the above condition by VendorName and sort the resulting rows in the order of BalanceDue. You will therefore, obtain for each row in the NumberOfInvoices column, the number of invoices for each vendor that have a larger balance due than the average balance due for all invoices.

7 0
3 years ago
Other questions:
  • What is A/B Testing
    10·2 answers
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens
    15·1 answer
  • What does social protocol means in network?
    9·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Write a program that calculates the amount of money the salesperson will earn from selling discount cards. java program
    8·1 answer
  • If you wanted a computer to store a variable with the content of “110 Maple Street,” which data type would be most appropriate?
    15·2 answers
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • Javed’s teacher tells him she would like to see him improve his speaking skills in the next debate by including a rhetorical app
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!