1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
3 years ago
11

A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call

ed account.doC) The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?A) Your user inadvertently downloaded a macro virus using IM.B) Your user may have downloaded a rootkit.C) Your user may have accidently changed a setting on the system.D) The system is unstable due to the use of IM.
Computers and Technology
1 answer:
solniwko [45]3 years ago
7 0

Answer: A) Your user inadvertently downloaded a macro virus using IM

Explanation:

As the user has downloaded a file from a prospective client ad the file was account.doc, but since then the system of the user has not been behaving normally so the most possible reason could have been the user has inadvertently downloaded a micro virus using the IM. These micro virus are invisible programs which can be transferred inadvertently from one user to another another. They can be transported over the network.

Option b is not correct as the user has not download a rootkit as it would require special privileges.

Option c is not correct as the user upon changing a setting in the system can reset it.

Option d is not correct as using the IM is not unstable to the system.

So, the correct option is A.

You might be interested in
Please help me !!
gavmur [86]

e. uhmmm

19+21=30

like....

easy.

What grade class is this? I wanna do it cause it easy AFef

6 0
3 years ago
What number system do people in America use?
Sindrei [870]

Answer:

Base-10 (decimal)

Explanation:

8 0
3 years ago
Read 2 more answers
Why is the radial gradient type a good choice for the grapes?
Grace [21]
<span>when you use the radial gradient fill it gives it a look like a shine on them. </span>
3 0
3 years ago
Read 2 more answers
"in program arrays12.java a swap method is called. does the swap method exchange parameter values x and y?"
horrorfan [7]
<h2>Yes the swap method exchange parameter values if passed by reference or the value gets changed inside the function.</h2>

Explanation:

Since the program is not given, I will try to guide you about the mode of parameters.

The meaning of swap is interchanging the values. It can be done by using temporary variable or without using it (if the values are integers).

While passing the parameters, there are two ways, call by value/pass by value and call by reference/ pass by reference.

If call by value, then the value gets swapped only inside the function and will not reflected in the calling portion. Call by reference is other way round.

6 0
3 years ago
Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server
adelina 88 [10]

Answer: C. Differential backup

Explanation: There are several ways od ensuring the preservation and storage of data even cases of disaster, one of such ways is data data mirroring which allows data to be replicated or copied in real time and several backup options. In cases where there there is need to restore a server, the warm recovery site provides a data or disaster recovery option used to mitigate the effect of data loss on organization. In the absence of data mirroring, differential backup option, provides the quickest recovery option as it only requires changes in the data stored after the last full backup. These speed experieced should be expected due to the relatively low data been dealt with rather than the entire data.

5 0
3 years ago
Other questions:
  • Sam's manager would like him to create and distribute copies of a budget report for each department. The budget report should sh
    8·2 answers
  • Generally speaking, manufacturing overhead is applied to production by means of a __________ __________ __________, which is com
    11·2 answers
  • When tcp/ip was developed, the host table concept was expanded into a hierarchical name system for matching computer names and n
    5·1 answer
  • A firewall, when properly implemented, can prevent most attacks on your system.
    11·1 answer
  • How much space should be allotted to park your vehicle parallel to the curb?
    5·1 answer
  • PLEASE HELP!!!!
    7·1 answer
  • Anybody wanna be friends?
    10·2 answers
  • What do we call the software program that handles the communication between a peripheral device and your computer?
    8·2 answers
  • Could u give me brief summary of New Years
    14·2 answers
  • Which web-authoring software enables users to create sophisticated web pages without knowing any html code?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!