1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
4 years ago
13

While running a full system scan using your anti-malware software, three files have been identified as possible problems. You wa

nt to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer.What action should you take?
Computers and Technology
1 answer:
Maksim231197 [3]4 years ago
4 0

Answer: Quarentine the files

Explanation:

Hi, when an possible infected file is in quarantine, it means that is deleted from its original location and instead is putted in other location where it cannot longer affect the system. If there was a virus in the file, it is no harmless.

You can decide later if you want to delete it permanently or if not.

You might be interested in
What is the easiest way to defeat ganon in BOTW?
garri49 [273]

Answer:

concentrate on his little back legs. Wait for him to attack, and run around the back, where you can swing away.

Explanation:

4 0
3 years ago
Read 2 more answers
Supplies/material used in iron​
Novay_Z [31]
The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.
3 0
3 years ago
Consider the following code: String word [] = {"algorithm", "boolean", "char", "double"}; for ( int i =0; i < word.length/2;
KiRa [710]

Answer:

{"double", "char", "char", "double"} will be stored in word.

Explanation:

Given the word is an array of four strings,  {"algorithm", "boolean", "char", "double"}. Hence, the length of the word array is 4.

The for-loop will only run for two iterations due to i < word.length/2, with i = 0 (first loop) and i = 1 (second loop).

In the first loop,  

  • word[word.length - 1 - i]  =  word[4 - 1 - 0]  = word[3]  = "double"
  • Hence, the string "double" will be assigned to word[0] and overwrite "algorithm"

In the second loop,

  • word[word.length - 1 - i]  =  word[4 - 1 - 1]  = word[2]  = "char"
  • Hence, the string "char" will be assigned to word[1] and overwrite "boolean"

At last, the word array will hold {"double", "char", "char", "double"}

8 0
4 years ago
Read 2 more answers
Use a search engine and spot the sponsored results for safer internet day.
snow_tiger [21]
What’s the question?
4 0
3 years ago
What are two key elements of describing the environment?​ a. ​ Communication protocols and security methods b. ​ External system
pashok25 [27]

Answer:

B. External systems and technology architecture.

Explanation:

In such environment, you have to know what external systems are in place so have proper communication with External Systems whether be in message format or web/networks, Communication protocols, Security methods, Error detection and recovery,

Additionally, it consits of technology architecture so conforming to an existing technology architecture helps us discover and describe existing architecture

3 0
3 years ago
Other questions:
  • Acme Parts runs a small factory and employs workers who are paid one of three hourly rates depending on their shift: first shift
    5·1 answer
  • Each brochure template produces _____ pages of graphics, business information text boxes, and story boxes.
    15·1 answer
  • The set of rules for how computers talk to one another
    6·1 answer
  • Garrett has a column of data. What can he do at the bottom of that column of data using an Auto function? Check all that apply.
    8·2 answers
  • With iteration-control systems, each team member ________. is given an account with a set of permissions is given their own priv
    6·1 answer
  • What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?
    6·1 answer
  • Which of the following statements is true?
    5·1 answer
  • After inserting a video into your slide how can you test it
    11·1 answer
  • Create a relational database table in Microsoft Excel for the grocery store of 20 employers.
    12·1 answer
  • I’m not very good at using word because this is my second time using it lol
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!