1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
2 years ago
7

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c

omputer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.
Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?
Computers and Technology
1 answer:
TiliK225 [7]2 years ago
4 0

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
You might be interested in
Consider ________ when designing for display on a mobile device. font size all of these contrast small screen size
Delvig [45]
To be honest...i really dont know 
6 0
2 years ago
Read 2 more answers
Although a variety of different styles of documentation exist for report preparation, each style requires the same basic informa
BARSIC [14]
I would say the statement given above is true. <span>Although a variety of different styles of documentation exist for report preparation, each style requires the same basic information. Hope this answers the question. Have a nice day.</span>
3 0
3 years ago
"Device A" is an 8-port layer 2 managed switch and "Device C" is a 4-port hub. Which of the following describes "Device B," assu
tresset_1 [31]

Answer: (B) Router

Explanation:

A router is one of the type of virtual and the physical networking device which helps in forwarding the message in the form of data packets in the computer system.

  • The main function of the router is that it sends the message over the internet in the form of email and web page.
  • The router sending the data packets by assigning each device a local internet protocol address in the networking.

According to the given question, the router is refers to the Device-B so that it can communicate in normal circumstances in workstation. Therefore, Option (B) is correct.    

4 0
3 years ago
What difficulties would a user face when using a computer without an operating system
attashe74 [19]

Answer:

The user would not be able to access programs easily and would not be able to connect to internet and perform necessary tasks

Explanation:

7 0
2 years ago
A[n] _______________ is a hacker whose intention is the exploitation of a target computer or network to create a serious impact,
Margarita [4]
Cyberterrorist. They use the internet to hack into the government and private computer system which cripples the military.

8 0
2 years ago
Other questions:
  • In 2–3 sentences, describe how you would insert a table into a word-processing document.
    9·2 answers
  • Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
    15·1 answer
  • Why are many otherwise safety-conscious people victims of Internet crime?
    13·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    14·1 answer
  • You should use html elements instead of server controls when
    11·1 answer
  • What TYPE of flash drive is called when it saves your files safely? I'm going to use my friend computer that's why.
    5·1 answer
  • Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method
    8·1 answer
  • Which component of a word processor displays the name of the document?
    13·1 answer
  • Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm th
    14·1 answer
  • Explain how you think robotics plays a part in the subway driver's job.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!