1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexgriva [62]
4 years ago
13

What is windows powershell? I downloaded a fake video game on my PC.(It was an accident) Now, powershell is bugging me. Is it a

virus?
Computers and Technology
2 answers:
IrinaVladis [17]4 years ago
5 0

Answer:

The PowerShell is a kind of shell framework, which was being developed by Microsoft for covering various administrative tasks like the configuration automation and management of certain repetitive jobs. And the term 'PowerShell' does refer to both of these- and its the shell applied for executing commands, and scripting language.

And yes, you have been infected by the virus. You need to run the antivirus immediately.

Explanation:

Please check the answer section.

MaRussiya [10]4 years ago
4 0

Answer:

Probally

Explanation:

Apparently it is a "a ransomware-type virus distributed via a malicious file attached to spam email messages" Plus it may be taking data from you so be careful.

You might be interested in
What level of system and network is required for cui
galben [10]

Answer:

CUI will be classified at a “moderate” confidentiality level and follow DoDI 8500.01 and 8510.01 in all DOD systems. Non-DoD systems must provide adequate security with requirements incorporated into all legal documents with non-DoD entities following DoDI 8582.01 guideline

Explanation:

6 0
3 years ago
What protocol allows us to use a domain name like .com instead of an ip address?
san4es73 [151]
The answer is DNS (Domain Name System)

IP addresses are difficult to remember and therefore, the internet allows you to specify a computer using a host name. The same case happens to DNS. It maps domain names to IP addresses. Domain names are alphabetic making them easier to remember.



4 0
3 years ago
What are some examples and non-examples of digital security?
deff fn [24]

Answer:

Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices

5 0
3 years ago
Text that appears slightly below the line of the other text in the document is
djverab [1.8K]
<span>Text that appears slightly below the line of the other text in the document is a superscript</span>
4 0
3 years ago
Your desktop, internet explorer, and the media player can be started from this area on most computers
Allisa [31]
The answer is quick launch
3 0
3 years ago
Other questions:
  • What is the process of designing green buildings called
    9·2 answers
  • #Write a function called "in_parentheses" that accepts a
    5·1 answer
  • How do issues of equity, teacher education and budgeting impact technology in schools?
    7·2 answers
  • has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
    11·2 answers
  • When was the very first computer made??
    5·1 answer
  • To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
    13·1 answer
  • Tightly.
    5·1 answer
  • Which is the best reason for why it is important to be careful about entering personal information online?
    10·2 answers
  • Assuming auto-mdix is not supported, which of these devices would require a crossover cable when connecting to a router? (select
    13·1 answer
  • The software/system that helps make sure the retail firm doesn't have a stockout is?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!