1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
7

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c

omputer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.
Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?
Computers and Technology
1 answer:
TiliK225 [7]3 years ago
4 0

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
You might be interested in
PLZ HELP HELP HELP ME I NEED ANSWER MATH​
irina [24]

The first one is 0 (0/3=0)

The second one is 3 (3/3=1)

The third one is 2 (6/3=2)

The fourth one is 9 (9/3=3)

Hope this helps you :)

4 0
3 years ago
Read 2 more answers
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
Zina [86]

Answer:

Here is the C++ program:

#include <iostream> // to include input output functions

using namespace std; // to identify objects like cin cout

int counter(string userString, char character) { //function counter

   int count = 0;   // counts the no of times a character appears in the string

   for (int i=0;i<userString.length();i++)  

// loop to move through the string to find the occurrence of the character

       if (userString[i] == character) //if characters is found in the string

           count++;   //counts the occurrence of the character in the string

   return count; }   //returns the no of times character occurs in the string

int main() { //start of the main() function body

   string s; // stores the string entered by the user

   cout<<"Enter a string: "; //prompts user to enter the string

   cin>>s; //reads the string from user

   char ch; //stores the character entered by the user

   cout<<"Enter a character: "; //prompts user to enter a character

   cin>>ch; //reads the character from user

   cout << counter(s, ch) << endl; }  

//calls counter function to find the number of times a character occurs in the //string

Explanation:

The counter function works as following:

It has a count variable which stores the number of occurrences of a character in the userString.

It uses a for loop which loops through the entire string.

It has i position variable which starts with the first character of the string and checks if the first character of userString matches with the required character.

If it matches the character then count variable counts the first occurrence of the character and in the userString and is incremented to 1.

If the character does not match with the first character of the userString then the loops keeps traversing through the userString until the end of the userString is reached which is specified by the length() function which returns the length of the string.

After the loop ends the return count statement is used to return the number of occurrences of the character in the userString.

The main() function prompts the user to enter a string and a character. It then calls counter() function passing string s and character ch arguments to it in order to get the number of times ch appears in s.

The output is attached in a screenshot.

6 0
4 years ago
PLEASE HELP ME ASAP I HAVE AN EXAM SOON!!!!
3241004551 [841]

Answer:

try seeing if the nozzle of the cartridge is clogged

Explanation:

8 0
3 years ago
Brian's father drives a car that uses voice commands for navigation. Which Al application field is Brian's father using?
Aneli [31]
O.C speech recognition
8 0
4 years ago
Front office employees at the Melville Lodge use a computer-based system to manage, among other things, the central reservation
Step2247 [10]

Answer:

Property Management System

Explanation:

A property management system (PMS) is a software sytem used for the operations of hospitality properties and manufacturing industries sometimes.

6 0
4 years ago
Other questions:
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    9·1 answer
  • What must be done to translate a posttest loop expressed in the form
    9·1 answer
  • World wide web is another name for Internet <br> True or false?
    8·2 answers
  • To select a new theme for a slideshow use the blank tile in the ribbon
    9·2 answers
  • Henry is nervous speaking in public, and it shows every time he presents his ideas to his coworkers and manager. One of his team
    6·2 answers
  • What are the four elements of game design?<br><br> Help Me!!
    9·1 answer
  • PLEASE HELP 98 POINTS!!!!!!!!!!!!!!!!!!
    12·2 answers
  • Microsoft PowerPoint is popular software that allows you tocreate slides, handouts, notes, and outlines.
    12·1 answer
  • Which step of the problem-solving process did the farmer use in order to figure out what success would look like?
    7·1 answer
  • Which ipconfig command switch would a technician use to display detailed information (such as dns servers and mac addresses)?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!