1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
3 years ago
14

An executable file that was determined to be infected with a virus was terminated from the running processes list. However, afte

r a few seconds, you discover the infected file is running again, despite no other processes appearing to be infected. What type of virus might this be?
Computers and Technology
1 answer:
Mama L [17]3 years ago
8 0

Mostly Trojan will has multiple version and I love u virus extra.

<u>Explanation:</u>

As first step workstation or desktop or laptop to scanned for virus and if any virus or malware found then it should be removed first. Operating system should be updated with latest patch, virus signature also be updated once again executed founded by virus infected.

Better to copy new exes and place in the same folder and try to execute again. If still the problem persists download antivirus software such as Norton, bit defender, Kaspersky etc. executable files affected by 15-20 viruses

You might be interested in
What game is a great example of a story unfolding as the levels increase where the player learns more about the plight of the pr
Phantasy [73]
Fortnite and mario kart are good examples
4 0
3 years ago
Read 2 more answers
Which of the following applies to a DNS caching server? (Choose all that apply.)
Alborosie

Answer:

The answers are:  it is used to enable fast DNS queries and  It can help reduce the amount of network traffic generated by DNS servers.

Explanation:

Because a DNS server can resolve a query from tis local data sends a recursive qyery to a root server.

3 0
4 years ago
To be fluent in computer language you must learn 8000 __________? (9 letter word)
zheka24 [161]

Answer:

I believe its Algorithm

Explanation:

4 0
3 years ago
Bloodborne pathogens travel by way of blood cells and can only be spread by person-to-person contact with infected blood
Eva8 [605]
That is incorrect. It is only contagious if blood is injected into person who is not infected.
5 0
3 years ago
Read 2 more answers
The rules that establish an orderly transfer of data between sender and receiver are called ____.
zloy xaker [14]
Protocols               is the answer                        
8 0
3 years ago
Read 2 more answers
Other questions:
  • His function starts a new session.
    12·1 answer
  • What age group is experiencing the most growth in social media
    13·1 answer
  • Memory management is concerned with __________.
    14·1 answer
  • Who were the big players in the yellow journalism movement?
    7·1 answer
  • What is the result when you run the following program?<br> print("2 + 7')<br> print(3 + 1)
    6·2 answers
  • Which of the following best describes the protocol used on the internet?
    8·1 answer
  • Note oj cyber security​
    6·1 answer
  • For this program you will build a simple dice game called Pig. In this version of Pig, two players alternate turns. Players each
    6·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • If String str = "Computer Science";, then what is the value of str.substring(10);? ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!