1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
2 years ago
11

A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call

ed account.doC) The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?A) Your user inadvertently downloaded a macro virus using IM.B) Your user may have downloaded a rootkit.C) Your user may have accidently changed a setting on the system.D) The system is unstable due to the use of IM.
Computers and Technology
1 answer:
solniwko [45]2 years ago
7 0

Answer: A) Your user inadvertently downloaded a macro virus using IM

Explanation:

As the user has downloaded a file from a prospective client ad the file was account.doc, but since then the system of the user has not been behaving normally so the most possible reason could have been the user has inadvertently downloaded a micro virus using the IM. These micro virus are invisible programs which can be transferred inadvertently from one user to another another. They can be transported over the network.

Option b is not correct as the user has not download a rootkit as it would require special privileges.

Option c is not correct as the user upon changing a setting in the system can reset it.

Option d is not correct as using the IM is not unstable to the system.

So, the correct option is A.

You might be interested in
A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
dimaraw [331]
Perhaps instead of cubicles, desks are organized in an open workspace which promotes collaboration (and makes it easier).
7 0
2 years ago
Read 2 more answers
Is permanent software programmed into read-only memory.<br> Firmware<br> JavaScript<br> PHP<br> o
velikii [3]
Firmware is the software
5 0
2 years ago
Why is computer called information processing machine....?​
mixer [17]

Answer:

Since the computer accepts raw data as input and converts into information by means of data processing

Explanation:

helping!!!

3 0
1 year ago
Read 2 more answers
Jennifer’s company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting
Vsevolod [243]

Answer:

RADIUS

Explanation:

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting management for users connected to a network service. It can be used to authenticate anyone who is on your network.

RADIUS is a protocol that uses TCP or UDP as transport. RADIUS client is what is used to communicate with RADIUS servers at gateways of the network.

8 0
3 years ago
Easy way of communication with people is one disadvantage of a network. *<br><br> 1.True<br> 2.False
Maksim231197 [3]

Answer:

false

because we are able to connect with people easily..

without have to wait for long time in the case of letters..

4 0
2 years ago
Read 2 more answers
Other questions:
  • To delete a database object, right-click the object in the Navigation Pane and then click ____ on the shortcut menu.
    15·1 answer
  • This type of technology does not come with a keyboard or mouse for input
    11·2 answers
  • SQL a. has become the de facto standard database language b. can be used to define database systems c. both a. and b. d. none of
    10·1 answer
  • Describe an application or a situation in which it is not convenient to use a linked list to store the data of the application
    12·1 answer
  • What happens when the following code segment executes if test.txt does not exist?:<br> A,B,C,D?
    7·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • Which of the following would most likely be the target audience for a product
    7·2 answers
  • Encrypting text allows us to encrypt and decrypt the text using a special key.
    9·1 answer
  • What refers to a set of instructions executed in order?
    6·1 answer
  • You find information that you know to be classified on the internet. What should you do.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!