1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
14

Felicia has been having problems with her computer. Her documents won’t open, her computer is running slow, and programs automat

ically open. Which preventive measure did she fail to take, because of which this is happening?
A) cleaning hardware
B) clearing unwanted files
C) backing up data
D) updating system software
E) installing antivirus software
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
7 0

Answer:

E and D

Explanation:

Malicious softwares are unsolicited softwares developed by attackers to exploit computer systems and network vulnerabilities and steal information for fraudulent activities.

Trojan horse, viruses, worm, rootkit, adware, spyware, keylogger etc, are all examples of malicious software or malware. Some of these malware needs to be attached to a file extension like viruses, adware, spyware etc, while others like worms don't. Most malware corrupt files, slows down the computer and corrupts both system and application softwares.

To prevent this, the system or operating system must be constantly updated and an antivirus software should be installed and updated as well.

You might be interested in
Use the Web as a resource to study the PDF format. a. Describe how PDF provides output that is consistent across different types
Deffense [45]

Answer:

Explanation:

PDF or (Portable Document Format) this is a format standard to store, design, administrate, this standard include bit maps format, image format, objects, and text format, all these formats to show pages quickly, PDF is a standard and for the devices can show this format, devices like prints, laptops, or even cellphones.

6 0
4 years ago
How often should administrators and network users be required to change their password?
Sergeu [11.5K]
Once every 3 month's
8 0
3 years ago
What does gps stand for ?
frutty [35]
GPS stands for Global Positioning System
3 0
4 years ago
Read 2 more answers
Environmental technology examples
meriva

Exhaust Gas Recirculation (EGR) for NOx control
<span>Positive Crankcase Ventilation (PCV) for HC emission control </span>
Evaporative Emissions Control(EVAP)
<span>Catalytic Converter for HC and NOx control</span>
6 0
3 years ago
Which type of electronic payment is typically favored in b2b?
Dennis_Churaev [7]
Electronic checks would<span> typically be favored in b2b</span>
4 0
3 years ago
Other questions:
  • What are the 21St century competencies or skills required in the information society?<br>​
    15·1 answer
  • Optimally, the __________ guides investment decisions and decisions on how ISs will be developed, acquired, and/or implemented.
    6·1 answer
  • Why is a networked system a benefit?
    7·1 answer
  • Ricardo twists his ankle at work but does not immediately realize that he is injured because his ankle is not sore or swollen, a
    5·1 answer
  • The first query is computationally less expensive than the second query. (Assume no indexes exist on release_date.) Query 1: SEL
    11·1 answer
  • Jack lost all the data he saved on his desktop because of a power outage while working on a presentation. On which of these comp
    15·2 answers
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • Is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?
    8·1 answer
  • write a function that given an integer n returns the smallest integer greater than n the sume of whose digits is twice as big th
    13·1 answer
  • 5 differences between a regular mouse and a gaming mouse​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!