1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-14-01-66 [18.8K]
3 years ago
11

A user has just reported that he downloaded a file from a prospective client using IM. The user indicates that the file was call

ed account.doC) The system has been behaving unusually since he downloaded the file. What is the most likely event that occurred?A) Your user inadvertently downloaded a macro virus using IM.B) Your user may have downloaded a rootkit.C) Your user may have accidently changed a setting on the system.D) The system is unstable due to the use of IM.
Computers and Technology
1 answer:
solniwko [45]3 years ago
7 0

Answer: A) Your user inadvertently downloaded a macro virus using IM

Explanation:

As the user has downloaded a file from a prospective client ad the file was account.doc, but since then the system of the user has not been behaving normally so the most possible reason could have been the user has inadvertently downloaded a micro virus using the IM. These micro virus are invisible programs which can be transferred inadvertently from one user to another another. They can be transported over the network.

Option b is not correct as the user has not download a rootkit as it would require special privileges.

Option c is not correct as the user upon changing a setting in the system can reset it.

Option d is not correct as using the IM is not unstable to the system.

So, the correct option is A.

You might be interested in
Which of the following behaviors is considered ethical? copying another user’s password without permission hacking software to i
Svetlanka [38]

Answer:

using a limited acess public computer to watch movies

Explanation:

it is the only thing that could not get you in trouble

6 0
4 years ago
Read 2 more answers
What functionality can a vulnerability scanner provide that a port scanner cannot?
Rina8888 [55]
<span>Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
</span>port scanner<span> allows testing of open </span>ports and firewalls. It d<span>iscovers open UDP </span>ports<span> on your target system by </span>scanning with NMAP and by doing so it is<span> the first step of a complete </span>vulnerability<span> assessment. </span>
7 0
3 years ago
Dash+dash=100<br>Both dash and dashare prime numbers.<br>How many different solutions can you find​
ioda

Answer:

6

Explanation:

97+3 = 100

89+11 = 100

83+17 = 100

71+29 = 100

59+41 = 100

53+47 = 100

I counted them using excel, see pic.

5 0
3 years ago
Okay so I know this is a platform for assignments but I really need a tech expert... So I had a 16 GB SD card and because of eve
Masja [62]

I'm not too experienced with code including external memory, but i believe there was an error with the code mixing that either mixed lines of code up or got rid of code to save files onto your device. Try looking up code for the device, see if that helps at all.

6 0
3 years ago
Help please will mark BRAINLIEST
aliya0001 [1]
Origin symmetry, I believe it’s conceptual or artistic but i’m not 100% sure, also not 100% on this one but I think it’s false, the first one, third one. Like I said I don’t know much about blender but I think the others are correct.
3 0
3 years ago
Other questions:
  • AI vs IA like the difference
    12·2 answers
  • The difference between an AutoCorrect entry and a building block is that the building block feature makes corrections automatica
    6·1 answer
  • What does it mean for a school to be “accredited”?
    5·1 answer
  • Intro to Computers quiz answers me need for test please help me hurry
    5·1 answer
  • The most frequently applied heuristic in problem solving is a(an) _________, which involves repeated tests for differences betwe
    13·1 answer
  • Although heart rate increases and decrease depending upon activity level on average a typical person heart rate is about _____ b
    10·1 answer
  • Describe the functions of ALU, resisters, CU, BIU, Cache and FPU.
    7·1 answer
  • Defensive driving is when you use driving strategies to minimize risk and help avoid accidents.​
    8·1 answer
  • Which type of storage disk and disk drive can you use in the given situation?
    9·1 answer
  • . Write a C++ Code to get a multiline statement Str1 from a user with a ‘$’ as return character (Hint:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!