1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
4 years ago
7

What type of malware can hijack internal windows components and often goes undetected because it is already loaded when the anti

virus software loads?
Computers and Technology
1 answer:
julsineya [31]4 years ago
7 0
Rootkits are deeply embedded malware that are typically loaded at boot time, so they are not actually in your operating system. AV software can't see them. The solution against rootkits is to have a computer using a secure boot mechanism. Your PC will cryptographically verify the boot software and simply will not allow an unknown boot program to start.

Microsoft requires PC's to support secure boot, in order to deserve the Windows 10 logo sticker.
You might be interested in
Which tab and group will allow the insertion of rows and columns in a worksheet?
ivanzaharov [21]
Home tab, cells group
5 0
3 years ago
Read 2 more answers
Give three facts about the history of the train shongololo
monitta
<span>began operating in 1995
shongololo means </span><span> “to roll up”
non- profit organization </span>
3 0
4 years ago
In designing input by clinicians for an EHR system, which of the following would be effective for a clinician when the data are
svetoff [14.1K]

Answer:

Speech recognition

Explanation:

Speech recognition would be effective for a clinician when data entry is fairly repetitive and the vocabulary used is fairly limited and over time it as become a replacement for other forms of dictation.

3 0
4 years ago
Read the scenarios below, then use the drop-down menus to decide if you should use a database.
Romashka [77]

Answer:

A. The parent-teacher orginization keeps a log of cookies sales to raise money for the elementary school.

Explanation:

5 0
3 years ago
a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​
Amiraneli [1.4K]

Answer:

i think is "none of them"

5 0
4 years ago
Other questions:
  • Anna wants to open the Run dialog box to run her program file. Which keys should she press to open the Run dialog box?
    14·1 answer
  • How do I learn coding??? ​
    5·2 answers
  • How do I change my keyboard's debounce time?
    15·2 answers
  • The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
    5·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    12·1 answer
  • Which type of microscope can only be used to view non-living specimens?
    10·2 answers
  • Help me find the difference between these logos
    10·2 answers
  • What is a single-user computer?
    8·1 answer
  • The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
    9·1 answer
  • Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!