1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
7

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c

omputer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.
Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?
Computers and Technology
1 answer:
TiliK225 [7]3 years ago
4 0

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
You might be interested in
Whats your favorite .io game (example krunker.io, gawd.io)<br> (PS FWEE PTS BOIS)
marshall27 [118]

Answer:

starve.io

Explanation:

It's basically an entire game, you can play a single run for hours and it's all new content the entire way, not to mention it's actually difficult the entire way through.

4 0
2 years ago
In Python which is the correct method to load a module math?
Wittaler [7]

Answer: The math module is a standard module in Python and is always available. To use mathematical functions under this module, you have to import the module using import math .

Explanation:

3 0
3 years ago
Here is the header for a function named computeValue:
zhuklara [117]

Answer:

B) computeValue(10);

Explanation:

Given

Header: void computeValue(int value)

Required

Determine the valid call

To call a function from another function or from the main, the following syntax has to be used.

<em>function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);</em>

<em />

In the function header given:, the following can be observed:

  • The function name is computeValue
  • It has only one parameter and it is of type integer

So, to call the function; we make use of computeValue(10);

Where 10 represents the value of the parameter (i.e. argument)

7 0
3 years ago
Most people entering the construction industry learn a specific craft through:
LuckyWell [14K]
Most people entering the construction industry learn a specific craft through: An apprenticeship program
7 0
3 years ago
Read 2 more answers
Where must virtualization be enabled for VM (virtual machine) software to work?
Lelu [443]

Answer:

b) BIOS/UEFI

Explanation:

Virtualization can be defined as a technique used for the creation of a virtual platform such as a storage device, operating system, server, desktop, infrastructure or computing resources so as to enable the sharing of resources among multiple end users. Virtualization is usually implemented on a computer which is referred to as the "host" machine.

Generally, virtualization must be enabled in the BIOS/UEFI for VM (virtual machine) software to work.

BIOS is an acronym for Basic Input/Output System while UEFI is an acronym for Unified Extensible Firmware Interface. BIOS/UEFI are low-level software that serves as an intermediary between the operating systems and the computer's firmware or hardware components. The UEFI is actually an improvement of the BIOS and as such is a modernized software.

Basically, the BIOS/UEFI is a software which is an essential tool or feature which must be enabled to link the virtual machine with the hardware components of the computer.

5 0
3 years ago
Other questions:
  • If you want to conserve ink or toner, you can instruct PowerPoint to print ____ documents.
    10·1 answer
  • Explain the role of the domain name system
    15·1 answer
  • On a spreadsheet, this is the term for a grouping of cells that touch each other and form a rectangle. An example of it would be
    13·1 answer
  • In an is framework, ________ is the bridge between the computer side on the left and the human side on the right
    12·1 answer
  • You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
    15·1 answer
  • Which of the following is a beneficial reason to extract mineral resources from the earth?
    13·2 answers
  • The difference between a for loop and a while loop is that a for loop is a loop that happens for a certain number of times. A wh
    14·1 answer
  • Help me asap please
    15·1 answer
  • Consider the following method, which is intended to return the index of the first negative integer in a given array of integers.
    14·1 answer
  • Complete the sentence.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!