1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svp [43]
3 years ago
10

Caroline’s personal laptop was attacked by malware. When she got it fixed from the service center, the computer technician advis

ed her to install software that would detect and prevent malware from attacking her system. Which of the following software did the technician advise her to install?
Computers and Technology
1 answer:
Mademuasel [1]3 years ago
4 0

Answer:

Antivirus Software.

Explanation:

Antivirus software is designed to identify, locate and destroy malware on a computer. It can also help to prevent malware to infect the system.

The antivirus will look for suspicious files or programs that could potentially harm your computer using several algorithms based on already known malware, suspicious behaviors on programs that could be harmful and malware that could be variants of "families" already known.

You might be interested in
When building systems, the only two entities that constitute software engineering are people and process.
VLD [36.1K]

Answer: False

Explanation: Software engineering is the designing, analyzing, creating the software application as per the requirement of the user. The programming languages is the base for the designing of the application the software engineering field.

At the time of building system ,there is the requirement of many resources for the development.There is the requirement of the software skills, programming knowledge, resources and tools for the working and designing.Thus, there are different resources, people,skills processes, problem solving skill etc required for the building of the system.

7 0
3 years ago
What is the real meaning of hack and crack?
vovangra [49]
Hack means hack computer and crack means I guess your behind
7 0
3 years ago
Which of the following uses replication to Infect multiple computers?
Nikolay [14]

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

3 0
3 years ago
Read 2 more answers
What is administrator access? Multiple Choice refers to how quickly a system can transform to support environmental changes perf
IrinaVladis [17]

Answer:

Administrator access is:

refers to the varying levels that define what a user can access, view, or perform when operating a system refers to the time frames when the system is operational

Explanation:

The reasons behind this answer are that in the first place the administrator role is the maximum role an account can have in the operating system. Controlling the different levels of access the rest of the accounts can have on the system. It then is a hierarchical role, not the changes someone can execute in a certain environment, these are called rules.

3 0
3 years ago
As an interviewer, it is not necessary to be at eye level with interviewee<br><br> True<br> False
Tamiku [17]

Answer:

True

Explanation:

Have a great day

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program that will take an integer and add up each of the number’s digits, count the number of digits in the number, and
    13·2 answers
  • What are examples of some Exotic currencies?
    14·1 answer
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • Which social networking site became a gaming platform after 2009?
    6·2 answers
  • Alright, don't judge me, this is a question that involves my Childhood game PvZ GW 2. So I noticed mods and stuff that get uploa
    12·2 answers
  • Jerry has received an email on his company’s email system. The email is in regard to a new update the company plans to implement
    9·1 answer
  • DES: Group of answer choices A) is a commonly used symmetric encryption B) algorithm that was developed in the mid-C) 1970s was
    6·1 answer
  • When referring to hard drives, access time is measured in
    11·1 answer
  • Does technology shape society or does society shape technology?
    14·1 answer
  • What is meant by the term text?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!