1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
14

Felicia has been having problems with her computer. Her documents won’t open, her computer is running slow, and programs automat

ically open. Which preventive measure did she fail to take, because of which this is happening?
A) cleaning hardware
B) clearing unwanted files
C) backing up data
D) updating system software
E) installing antivirus software
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
7 0

Answer:

E and D

Explanation:

Malicious softwares are unsolicited softwares developed by attackers to exploit computer systems and network vulnerabilities and steal information for fraudulent activities.

Trojan horse, viruses, worm, rootkit, adware, spyware, keylogger etc, are all examples of malicious software or malware. Some of these malware needs to be attached to a file extension like viruses, adware, spyware etc, while others like worms don't. Most malware corrupt files, slows down the computer and corrupts both system and application softwares.

To prevent this, the system or operating system must be constantly updated and an antivirus software should be installed and updated as well.

You might be interested in
What concerns exist wherever personally identifiable information is collected stored in digital form or otherwise
Brums [2.3K]

Registration

Explanation:

This is because the personally identifiable information is collected and stored either for records.

5 0
3 years ago
What happens if you try to compile and run this program?
dezoksy [38]

Answer:

identifier "G" is undefined

Explanation:

The syntax of the code you provided is incorrect, so you cannot run this program.

7 0
3 years ago
Indicate whether the following actions are the actions of a person who will be a victim, or will not be a victim, of phishing at
Zepler [3.9K]

Answer:

Phishing Victim

Explanation:

Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted

4 0
3 years ago
Which type of server and network topology is preferable in a bank?
Mariana [72]

Answer:

1. Database

2. Tree

<u>Database</u>

An organized collection of data, that is stored form different computer system is called Database.

<u>Tree Topology</u>

A type of network in which multiple computers are connected in a tree like structure. This type of network topology is used to organize data in database.

<u>Explanation</u>

In banks database servers are used to organize and store large volumes of financial data.

<em>To organize such type of data with the help increasing number of employs on database, tree topology is used to connect all computers of that bank on the network,</em>

3 0
4 years ago
What is the name of a popular high-level computer programming and scripting language that is the name of a snake?
Murljashka [212]
The name of the programming language is PYTHON.
Python is a popular, high level programming language that is used for general purpose programming. Python is objected oriented  and it uses dynamic typing for memory management. The programming language was created in the late 80's by Guido Van Rossum.
7 0
4 years ago
Other questions:
  • Select the term being defined. This term is also called live, or hot, which means that a voltage is present and it can cause an
    12·2 answers
  • What is looping? the rerecording of sound first recorded on set the recording of sound on set the process of combining different
    11·1 answer
  • PLEASE HELP I NEED RIGHT ANSWER!
    9·2 answers
  • In 1913, __________ developed a mass production system for cars that made it possible to produce more cars in a shorter period o
    5·2 answers
  • What is the awnser ?
    11·1 answer
  • What is the answer ?? plz help
    9·1 answer
  • SOMEONE HELP 60 POINTS!!!!! When creating business publications, these two factors must be determined before planning the layout
    8·2 answers
  • चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
    11·1 answer
  • IBM’s system that is built on the middle ground approach to AI.
    12·1 answer
  • Please help ⊙﹏⊙ thank you &lt;3
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!