1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dangina [55]
3 years ago
9

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victor

ia researched the virus and learned that the virus might have written itself into System Restore.
Computers and Technology
2 answers:
VMariaS [17]3 years ago
8 0

Answer:

Run antivirus software on the system and delete and create new restore point.

Explanation:

Trojan horse is malicious software that is used by attackers to infiltrate systems and networks, it runs in the system background undetected, to weaken the security of the computer and corrupt files etc. Virus is another type of malware that requires an attachable file to spread to other system.

When a trojan horse and virus infects a system and a restore point, an antivirus software must be run to detect and delete the malware and the restore point should be deleted.

tangare [24]3 years ago
3 0

Answer:

The question is incomplete and should read as follows:

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?

This issue can be fixed by taking the following steps:

A. Disable System Protection.

B. Back up the restore point.

C. Enable System Protection.

D. Run the antivirus software on a restore point.

The system is then restored to the now clean restore point to rid the computer completely of the virus.

Explanation:

You might be interested in
Meaning of mesh topology​
Pachacha [2.7K]

The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

<h3>What is meant by mesh topology?</h3>

Mesh topology is a kind of networking that is said to be where the full nodes do act in a form of a cooperation  so that they can be able to share or distribute data among themselves.

Note that this topology was said to be first seen or developed in about an approximate of about 30+ years ago and it is one that is often used in military applications and now it is seen to be used in home automation, smart HVAC control, and others.

Hence, The meaning of mesh topology​ is that it is a type of networking that is made up of the fact that all its nodes do work together to share data amongst each other.

Learn more about mesh topology​ from

brainly.com/question/14879489

#SPJ1

6 0
2 years ago
Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
barxatty [35]
Sam’s Public Key. Hope it helps)
6 0
3 years ago
How will you decide which browser security settings to allow and which ones to block?
Brums [2.3K]

One can decide which browser security settings to allow by reviewing them and using one's judgement.

Browsers like Chrome, Safari, Firefox all have innate personal browser security settings which can be altered according to users preferences.

  • Configuring of browsers setting is prominent for safeguarding sensitize information such as passwords, account details from getting accessed by a malicious third party.

In conclusion, one can decide these by reviewing each browser security setting and employ personal judgement to make decision.

Read more on this here

<em>brainly.com/question/13354554</em>

6 0
3 years ago
How many bits must be “flipped” (i.e., changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase ‘a’ that’s represe
castortr0y [4]
Only one.
00100001 is 'A'
01100001 is 'a'
4 0
3 years ago
Write an SQL query for the HAPPY INSURANCE database that will, for each client of the agent named Amy, list the client's name an
matrenka [14]

The SQL Query for the HAPPY INSURANCE database given above is:

SELECT ClientName, AgentName FROM Client, Agent WHERE ClientAgent = AgentID and AgentName = 'Amy';

<h3>What is an SQL Query?</h3>

Structured Query Language (SQL) is a computer language that is used to manage relational databases and execute different operations on the data contained inside them.

This implies that the above code will only work where there is a database to manage.

Learn more about SQL at:
brainly.com/question/25694408
#SPJ1

4 0
2 years ago
Other questions:
  • -Another question involving microsoft word-
    11·1 answer
  • Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked?
    14·1 answer
  • import java.util.Scanner; public class StudentScores { public static void main (String [] args) { Scanner scnr = new Scanner(Sys
    5·1 answer
  • Which statements are true about modern
    9·1 answer
  • Write a program that reads three numbers and print the largest one step by step answer
    9·1 answer
  • This refers to the people involved in the data processing operation.
    14·1 answer
  • Which of the following are common data types? Check all that apply.
    6·1 answer
  • The distance that light travels in a vacuum in one year is a(n) _____. A. AU B. parsec C. light-year D. kilometer
    15·1 answer
  • I will give brainliest to the best answer. what is a good screen recorder
    11·1 answer
  • The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain so
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!