1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
14

Felicia has been having problems with her computer. Her documents won’t open, her computer is running slow, and programs automat

ically open. Which preventive measure did she fail to take, because of which this is happening?
A) cleaning hardware
B) clearing unwanted files
C) backing up data
D) updating system software
E) installing antivirus software
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
7 0

Answer:

E and D

Explanation:

Malicious softwares are unsolicited softwares developed by attackers to exploit computer systems and network vulnerabilities and steal information for fraudulent activities.

Trojan horse, viruses, worm, rootkit, adware, spyware, keylogger etc, are all examples of malicious software or malware. Some of these malware needs to be attached to a file extension like viruses, adware, spyware etc, while others like worms don't. Most malware corrupt files, slows down the computer and corrupts both system and application softwares.

To prevent this, the system or operating system must be constantly updated and an antivirus software should be installed and updated as well.

You might be interested in
Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (l
kompoz [17]

Answer:

Explanation:

The following code is written in Java and creates the recursive function to find the longest common substring as requested.

 static int lengthOfLongestSubsequence(String X, String Y) {

       int m = X.length();

       int n = Y.length();

       if (m == 0 || n == 0) {

           return 0;

       }

       if (X.charAt(m - 1) == Y.charAt(n - 1)) {

           return 1 + lengthOfLongestSubsequence(X, Y);

       } else {

           return Math.max(lengthOfLongestSubsequence(X, Y),

                   lengthOfLongestSubsequence(X, Y));

       }

   }

4 0
3 years ago
Create a function printInfo(some_dict) that given a dictionary whose values are all lists, prints the name of each key along wit
aleksandrvk [35]

Answer:

def printInfo(some_dict):

   print(len(some_dict['locations']), "LOCATIONS")

   for location in some_dict['locations']:

       print(location)

   print()

   print(len(some_dict['instructors']), "INSTRUCTORS")

   for location in some_dict['instructors']:

       print(location)

seattle = {

   'locations': ['San Jose', 'Seattle', 'Dallas', 'Chicago', 'Tulsa', 'DC', 'Burbank'],

   'instructors': ['Michael', 'Amy', 'Eduardo', 'Josh', 'Graham', 'Patrick', 'Minh', 'Devon']

}

printInfo(seattle)

Explanation:

7 0
3 years ago
Write a brief description of what the local authorities are recommending in the news people should do to protect themselves from
lana [24]
The brief description of the local author asbestos is Hope and that's what it would too with a heart and another heart which equals 100 which equals yes
3 0
3 years ago
E-governance is the only solution against corruption. justify the statement in context of nepal​
notka56 [123]

Answer:

Following are the solution to this question:

Explanation:

The E-government implies use as part of the government systems to offer SMART, which is used to manage smart governance, ethics or accountability, sensitivity, and transparency. It is the research teams, that also shown that policies were progressing in India's creation of information technology. It is also argued against reducing the risk of bribery through improved public official surveillance and reducing its need for citizen engagement with porters with key services.

6 0
3 years ago
In one week, your company received the following quantities of e-mail messages. Monday 240 Tuesday 315 Wednesday 290 Thursday 18
Vika [28.1K]

Answer:

280

Explanation:

Average = (240 + 315 + 290 + 180 + 375) ÷ 5

= 1400 ÷ 5

= 280

Cheers

3 0
3 years ago
Other questions:
  • A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to sever
    7·1 answer
  • Select five system utility functions.
    11·1 answer
  • Emotional intelligence is a new term to describe personal traits ?
    12·1 answer
  • Which types of files can be used to define Kubernetes manifest files? yaml, json, yaml and text files
    5·1 answer
  • What is Naptha used for?
    9·2 answers
  • While reading difficult content, you should always start witha.Surveying the chapterc.Reading the chapterb.Defining vocabulary w
    8·1 answer
  • Technical term of stealing personal information in social media.​
    5·1 answer
  • A large amount of data is stored in secondary storage is it true<br>​
    8·2 answers
  • When you save a presentation with a .potx file extension, which type of powerpoint file is created?
    8·1 answer
  • Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!