1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
14

Felicia has been having problems with her computer. Her documents won’t open, her computer is running slow, and programs automat

ically open. Which preventive measure did she fail to take, because of which this is happening?
A) cleaning hardware
B) clearing unwanted files
C) backing up data
D) updating system software
E) installing antivirus software
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
7 0

Answer:

E and D

Explanation:

Malicious softwares are unsolicited softwares developed by attackers to exploit computer systems and network vulnerabilities and steal information for fraudulent activities.

Trojan horse, viruses, worm, rootkit, adware, spyware, keylogger etc, are all examples of malicious software or malware. Some of these malware needs to be attached to a file extension like viruses, adware, spyware etc, while others like worms don't. Most malware corrupt files, slows down the computer and corrupts both system and application softwares.

To prevent this, the system or operating system must be constantly updated and an antivirus software should be installed and updated as well.

You might be interested in
Use an ifstream object named indata to read the first three integers from a file called lottowins and write each number to stand
Gemiola [76]

Answer:

int x;

indata.open("lottowins");

indata >> x;

cout << x << endl;

indata >> x;

cout << x << endl;

indata >> x;

cout << x << endl;

indata.close();

4 0
3 years ago
This project involves writing a java program to simulate a blackjack card game. You will use a simple console-based user interfa
coldgirl [10]

Answer:i dont know sorry

Explanation:

8 0
3 years ago
United Broke Artists (UBA) is a broker for not-so-famous artists. UBA maintains a small database to track painters, paintings, a
lions [1.4K]

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the relation and the table names.

7 0
3 years ago
Read 2 more answers
When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by ________
andriy [413]

Answer:

Reference value.

Explanation:

8 0
3 years ago
Write a java program to read elements in an array from user and count total number of duplicate elements in array.
Anna11 [10]

Answer:

Explanation:

The following code is written in Java and is a function/method that takes in an int array as a parameter. The type of array can be changed. The function then creates a counter and loops through each element in the array comparing each one, whenever one element is found to be a duplicate it increases the counter by 1 and moves on to the next element in the array. Finally, it prints out the number of duplicates.

public static int countDuplicate (int[] arr) {

               int count = 0;

               for(int i = 0; i < arr.length; i++) {

                       for(int j = i + 1; j < arr.length; j++) {

                               if(arr[i] == arr[j])

                                       count++;

                       }

               }

               return count;

       }

8 0
3 years ago
Other questions:
  • ______ means locating a file among a set of file​
    14·1 answer
  • My current lesson is The Excel Screen and Worksheets and the question is:
    6·1 answer
  • A student is helping a friend with a home computer that can no longer access the Internet. Upon investigation, the student disco
    15·1 answer
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • Given an array of n distinct integers,d = [d[0], d[1],.., d[n - 1]], and an integer threshold, t, how many (a,b,c) index triplet
    11·1 answer
  • This has nothing to do with anything school related, but I'm new to car audio and I was wondering, what happens or what would ha
    13·1 answer
  • Which of the following is based on the visibility and location of an object’s features?
    15·1 answer
  • The part of the web page a user can view in a browser is located within the tag.
    6·1 answer
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • Full form of http.<br>wrong answer will be reported ​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!