1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
7

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c

omputer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.
Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?
Computers and Technology
1 answer:
TiliK225 [7]3 years ago
4 0

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
You might be interested in
What key stage involves considering design options?
Grace [21]

Answer: Formulating your brief

Explanation:

The key stage that involves considering design options is formulating one's brief.

The aim of "Formulating Your Brief" is simply a way to determine the context in which a particular work will be to be undertaken after which the aim is then defined. It can either be formal or informal.

7 0
3 years ago
Which option would a computer engineer most likely create? A) a programming language to run a new software program B.) the part
Zolol [24]

pogram b

Explanation:

3 0
3 years ago
In order to create strong neural networks (connections) in your brain, you've got to __________ the learning process.
sleet_krkn [62]

Answer:

A. Participate actively in

Explanation:

The brain starts to develop even before a child is born and continues into adulthood. During the first few first years of a child's life, neurons, synapses and axon are multiplied to millions. The child's learning process determines the neural connections to be cut off by pruning. An active connection is retained while inactive neurons, synapses and axons are eliminated.

As the child grows, neural connections are strengthened by active participation in the learning process. But when these connections are left idle, they tend to decay.

8 0
3 years ago
How's your day :D I hope its goin well you amazing person :D
Rainbow [258]

Answer:

You are an awesome and amazing person!!

Explanation:

7 0
3 years ago
Read 2 more answers
The valence electron configurations of several atoms are shown. how many bonds can each atom make without hybridization? 2s^2 2p
Pie
Answer: This element needs 3 electrons to complete its octet state

Why?:
since the electrons in 2s2 are already paired they cannot form a bond pair with electrons from other elements without hybridisation however the 3 electrons in 2p3 are unpaired so can form bond pairs with electrons from other elements without hybridisation.

Hope this helps!
3 0
4 years ago
Other questions:
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • The purpose of the ____________ element is to provide a method for a browser to display different images depending on specific c
    14·1 answer
  • How do multi-cellular organisms develop?
    9·1 answer
  • Why is it important to explore an Integrated
    13·1 answer
  • When an ethernet nic has been configured by os to use half-duplex, the transmit pair of the twisted-pair cable uses?
    8·1 answer
  • Is the answer a,b,c,d
    8·1 answer
  • 6. Why did he choose to install the window not totally plumb?
    13·1 answer
  • The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry? horiz
    14·2 answers
  • Which of the following statements are true about file naming conventions? Check all of the boxes that apply.
    7·2 answers
  • Trojans depend on ________ to spread. A rootkits B self-replication C code injection D social engineering
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!