1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
7

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c

omputer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.
Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?
Computers and Technology
1 answer:
TiliK225 [7]3 years ago
4 0

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
You might be interested in
A device that allows multiple computers to communicate with each other is
Lapatulllka [165]

Answer:

A device that allows multiple computers to communicate with each other is

Network Hub.

Hope this helps!

:)

4 0
3 years ago
What game involves controlling a character who is trying to rescue his girlfriend from an ape?
ddd [48]

Answer:

E.  

Donkey Kong

Explanation:

5 0
4 years ago
Read 2 more answers
Which device is connected to a port on a switch in order to receive network traffic?
inysia [295]

Answer:

"Passive IDS" is the appropriate answer.

Explanation:

  • A framework that is designed mostly for monitoring and analyzing internet traffic operations and alerting a user or administrator about possible bugs, as well as disruptions, is known to be passive IDS.
  • This IDS cannot carry out certain preventive as well as remedial processes as well as operations by itself.
6 0
3 years ago
Wat is a computer risk<br>​
klemol [59]

Answer:

Virus, cyber theft

Explanation:

A computer risk is something that can potentially harm your data on your computer or harm you through a computer by using theft tactics from real people to autonomous viruses making it to your computer and slowing your computer. With cybrrtheft thieves can get personal info through accounts to pictures and payment information.

4 0
4 years ago
Read 2 more answers
This device is used to connect sections of large networks?
ryzh [129]
Monster energy boissss
6 0
3 years ago
Read 2 more answers
Other questions:
  • Why aren't the answers visible anymore? Thanks!
    8·2 answers
  • Google plus has communities BUT
    5·2 answers
  • In a weighted scoring model, the sum of the weights of all the criteria must total _____ percent.
    15·1 answer
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • You are using a new release of an application software package. You think that you have discovered a bug. Outline the approach t
    14·1 answer
  • What can be done in order to secure a WLAN/wireless access point?
    12·1 answer
  • Jane, a marketing manager for the Grocery SuperStore retail chain, fired up a computer program that gave her ready access to inf
    6·1 answer
  • Complete the statement pertaining to the number of frames used by the national television system committee. The national televis
    9·1 answer
  • There is a group of 10 people who are ordering pizza. If each person gets 2 slices and each pizza has 5 slices, how many pizzas
    9·1 answer
  • state how to transfee information from website to el processing document in computers and technology.​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!