1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
7

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c

omputer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.
Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?
Computers and Technology
1 answer:
TiliK225 [7]3 years ago
4 0

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
You might be interested in
WILL MARK BRAINLIEST.....
slamgirl [31]

Answer:

Variables. A variable is a way of naming and storing a value for later use by the program, ... its type, and optionally, setting an initial value (initializing the variable). ... byte x; x = 0; x = x - 1; // x now contains 255 - rolls over in neg. direction

Explanation:

7 0
3 years ago
On average, someone with a Bachelor's degree is estimated to earn ____ times more than someone with a high school diploma.
oee [108]
The correct answer is <span>B)</span> 1.4

It can be difficult to become a high earner in the U.S without a college degree. Those with a high school diploma or less are the lowest earners on average. According to research, average yearly earnings for someone with a bachelor’s degree are $59,124 as compared to someone with a high school diploma who earns an average of $35,256 per year. Thus, at the end of the day, the amount of money does become significant.



5 0
3 years ago
What should be done on a tablet in order for that tablet to cease all network connections?
ankoles [38]

Answer:

Turn On Airplane Mode

Explanation:

Turning off cellular does not turn off wifi.

Turning off wifi does not turn off cellular.

Turning off location services does not affect your network connections.

Airplane mode is what turns off all network connections.

3 0
3 years ago
If you want to protect your identity while social networking, then you might use a(n) ____________ for your profile image
notsponge [240]
Won't you use a fake photo for your profile image or not put one on at all! This is a very safe way to keep your identity a secret and that you are very safe while you are online.

Hope this help!!
4 0
3 years ago
The total nodal delay includes:
blondinia [14]

Answer:

all of the above

Explanation:

Total nodal delay is the sum of all types of delay.There are basically four types delay that are as following:-

  1. Processing Delay.
  2. Propagation Delay.
  3. Transmission Delay.
  4. Queuing Delay.

T(nodal)=T(processing)+T(propagation)+T(transmission)+T(queuing).

Where T is the delay time.We are given with propagation,transmission and processing.Nodal delay includes these 3 delays.

Hence we conclude that the answer is all of the above.

3 0
2 years ago
Read 2 more answers
Other questions:
  • Background Susan finished work on system architecture issues, and her system design specification was approved. Now she is ready
    15·1 answer
  • What test must you pass to get you're operators licence
    14·1 answer
  • Which of the following tends to be true of silent film acting as opposed to sound film acting?
    7·1 answer
  • Tammy is preparing to give a presentation. she would like to view information that will remind her what to say to her audience b
    10·1 answer
  • Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
    13·1 answer
  • Sarah has to add a picture from her computer file and add a caption to it. Arrange the steps in a correct sequence.
    9·2 answers
  • what you can do to increase your chances of getting employed with changes to your current digital footprint​
    6·1 answer
  • What will be the results from running the following code?
    5·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • What does NBT stand for?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!