1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
likoan [24]
3 years ago
14

An executable file that was determined to be infected with a virus was terminated from the running processes list. However, afte

r a few seconds, you discover the infected file is running again, despite no other processes appearing to be infected. What type of virus might this be?
Computers and Technology
1 answer:
Mama L [17]3 years ago
8 0

Mostly Trojan will has multiple version and I love u virus extra.

<u>Explanation:</u>

As first step workstation or desktop or laptop to scanned for virus and if any virus or malware found then it should be removed first. Operating system should be updated with latest patch, virus signature also be updated once again executed founded by virus infected.

Better to copy new exes and place in the same folder and try to execute again. If still the problem persists download antivirus software such as Norton, bit defender, Kaspersky etc. executable files affected by 15-20 viruses

You might be interested in
Students at a residence hall are reporting internet connectivity issues. The university’s network administrator configured the r
alisha [4.7K]

Answer: D) DHCP snooping

Explanation:

 DHCP stand for the dynamic host configuration protocol and it is basically use as the DHCP server. It provide the IP address to each device in the network and it is used to communicate with the other IP network.

According to the question, the student device basically receive the IP network and it is an unauthorized DHCP server which uses denial of service attack for several purposes.

DHCP snooping is basically use to prevent from such unauthorized device which gives the IP address to the clients. DHCP is the two layer security system technology that is bulit in the operating system.

7 0
3 years ago
One problem with using e-mail is that ______.
11111nata11111 [884]
As for this problem, taking into consideration the options presented is critical and that it has to be identified. The most probable and the most likely answer to be the correct one is C. Once e-mail is sent out, it cannot be taken back.

In some cases, e-mails can fail to be sent to the receiver of the mail due to some factors such as the internet connection of the sender, the amount of information it currently holds, and so on and so forth. There might have already been solutions for this that come in forms of applications, extensions, and the like, but once the e-mail is sent, it cannot be taken back.
6 0
3 years ago
Read 2 more answers
What is the definition of a client computer?
kozerog [31]

<u>Client computer:</u>

A customer is a bit of PC equipment or programming that gets to assistance made accessible by a server. The server is frequently (yet not generally) on another PC framework, wherein case the customer gets to the administration by method for a system.

A gathering of customers is generally called a customer framework. The individuals from a customer framework are normally identified with each other in at least one perspective. The customer is likewise another name for a product program used to associate with a server. 3. A customer can likewise be another term used to depict a client.

5 0
3 years ago
1 What do you understand by navigation through form?
Orlov [11]

Answer:

A navigation form is simply a form that contains a Navigation Control. Navigation forms are a great addition to any desktop database. Microsoft Access offers several features for controlling how users navigate the database.

7 0
3 years ago
The local Driver’s License Office has asked you to write a program that grades the written portion of the driver’s license exam.
Zepler [3.9K]

Answer: The c++ program is shown below.

#include <iostream>

using namespace std;

int main() {

   int ques[20], correct=0, incorrect=0, q[20];

// arrays to store answers for the questions

   char a[20], ans[20];

// variable to store pass or fail result

   string result;    

   for(int k=0; k<20; k++)

   {

       ques[k] = k+1;

       q[k] = 0;

   }    

   ans[0]='B';

   ans[1]='D';

   ans[2]='A';

   ans[3]='A';

   ans[4]='C';

   ans[5]='A';

   ans[6]='B';

   ans[7]='A';

   ans[8]='C';

   ans[9]='D';

   ans[10]='B';

   ans[11]='C';

   ans[12]='D';

   ans[13]='A';

   ans[14]='D';

   ans[15]='C';

   ans[16]='C';

   ans[17]='B';

   ans[18]='D';

   ans[19]='A';    

   for(int k=0; k<20; k++)

   {

       cout<<"Enter the ans for question "<<k+1<<endl;

       cin>>a[k];

   }    

   for(int k=0; k<20; k++)

   {

       if(a[k] == ans[k])

           correct++;

       else

       {

           incorrect++;

           q[k] = k+1;

       }

   }    

   if(correct >= 15)

       result = "passed";

   else if(incorrect >= 5)

       result = "failed";

       

   cout<<endl<<"You have "<<result<<" in the exam."<<endl;

   cout<<"Correctly answered questions "<<correct<<endl;

   cout<<"Incorrectly answered questions "<<incorrect<<endl;

   cout<<"Incorect questions are "<<endl;

   cout<<"\t";

   for(int k=0; k<20; k++)

   {

// 0 indicates correct question

       if(q[k] == 0)

           continue;

       else

           cout<<k+1<<"\t";

   }    

}

 

OUTPUT

Enter the ans for question 1

A

Enter the ans for question 2

A

Enter the ans for question 3

A

Enter the ans for question 4

A

Enter the ans for question 5

A

Enter the ans for question 6

A

Enter the ans for question 7

A

Enter the ans for question 8

A

Enter the ans for question 9

A

Enter the ans for question 10

A

Enter the ans for question 11

A

Enter the ans for question 12

A

Enter the ans for question 13

A

Enter the ans for question 14

A

Enter the ans for question 15

A

Enter the ans for question 16

D

Enter the ans for question 17

D

Enter the ans for question 18

D

Enter the ans for question 19

D

Enter the ans for question 20

D

You have failed in the exam.

Correctly answered questions 6

Incorrectly answered questions 14

Incorect questions are  

1 2 5 7 9 10 11 12 13 15 16 17 18 20  

NOTE:

The answers are stored in upper case. This program may not accept answers in lower case.

7 0
3 years ago
Other questions:
  • 1. Why isn't solar energy usually the only power source for a region?
    10·2 answers
  • Your new client's AdWords account has one campaign with one ad group that contains a list of hundreds of keywords. Which best pr
    6·1 answer
  • ∑_(A,B,C,D,E)▒〖(2,4,6,8,10,12,14,16,18,20,22,24,26,28,30)〗
    8·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • JAVA
    14·1 answer
  • Explain the statement that relational algebra operators can be composed. Why is the ability to compose operators important
    7·1 answer
  • Write a class Bug that models a bug moving along a horizontal line. The bug moves either to the right or left. Initially, the bu
    7·1 answer
  • ফাইল ও ফোল্ডারের মধ্যে পার্থক্য কি এবং ৫ টি ইনপুট ডিভাইসের নাম কি​
    7·2 answers
  • How do I put in a micro sd card that is in a sd adapter in to my laptop to make it work PLEASE HELP
    10·1 answer
  • Is anyone else's pa.dl.et not working??? It says The requested URL / was not found on this server. That’s all we know.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!