1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
6

What happens when a computer gets a virus?

Computers and Technology
2 answers:
Kruka [31]3 years ago
6 0
It basically starts acting strange and it slows down 
Volgvan3 years ago
3 0
You will start to get ad pop-ups like crazy, and your computer will be a lot slower. I'd recommend that you be careful downloading things, make sure it's the right thing you're downloading. Some people make false websites. Also the best thing to do is get a usb drive and store everything you want to keep and reset your computer to factory in your settings.
You might be interested in
Jack has a fear of getting up in front of a group of people and giving a presentation. When he gave his last presentation, he ta
dezoksy [38]

Answer:

Jack has to be very calm and try his best to present himself in an outward way and think about the fact that by the end of the night no one will remember that he messed up, I feel like he'll be okay :)

7 0
3 years ago
Read 2 more answers
Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and
Arturiano [62]

Answer:

for the 5 segments, the utilization is 3.8%

Explanation:

Given the data in the question;

segment size = 1090 bytes

Receiver window size = 5,718 bytes

Link transmission rate or Bandwidth = 26 Mbps = 26 × 10⁶ bps

propagation delay = 22.1 ms

so,

Round trip time = 2 × propagation delay = 2 × 22.1 ms = 44.2 ms

we determine the total segments;

Total segments = Receiver window size / sender segment or segment size

we substitute

Total segments = 5718 bytes / 1090 bytes

Total segments = 5.24587 ≈ 5

Next is the throughput

Throughput = Segment / Round trip

Throughput = 1090 bytes / 44.2 ms

1byte = 8 bits and 1ms = 10⁻³ s

Throughput = ( 1090 × 8 )bits / ( 44.2 × 10⁻³ )s

Throughput = 8720 bits / ( 44.2 × 10⁻³ s )

Throughput = 197.285 × 10³ bps

Now Utilization will be;

Utilization = Throughput / Bandwidth

we substitute

Utilization = ( 197.285 × 10³ bps ) / ( 26 × 10⁶ bps )

Utilization = 0.0076

Utilization is percentage will be ( 0.0076 × 100)% = 0.76%

∴ Over all utilization for the 5 segments will be;

⇒ 5 × 0.76% = 3.8%

Therefore, for the 5 segments, the utilization is 3.8%

4 0
3 years ago
What two actions does the RETI instruction perf orm? Why must these two actions be done in a single instruction, as opposed to a
Bas_tet [7]

Answer:

In assembly language, two instructions control the use of the assembly language procedure.

  • CALL
  • RET

CALL pushed the control to the return address onto the stack and transferred the control.

RET instruction returns the address that placed on the stack by a call instruction.

Explanation:

Action RET instruction

  • The RET instruction pops the address and returns off the stack, which is pointed by the stack pointer.
  • The stack is LIFO in memory at a particular location, and the pointer points offset from the stack location.

RET instruction does its job by consulting the register and memory state at the point when it is executed.

In RET instruction, only register and memory state is executed. Call instruction must save that address that figure out in a register and memory location.

5 0
3 years ago
With ____ editing, Word automatically displays a Paste Options button near the pasted or moved text.
harina [27]
The answer is drag and drop. 
 With drag and drop editing, word automatically displays a paste option button near the pasted or moved text. 
8 0
3 years ago
Interviews should never feel like an_________Instead, they should feel like a________
Rainbow [258]

Answer:

blank 1: interrogation

blank 2: getting to know

Explanation:

4 0
3 years ago
Other questions:
  • What do you think about net neutrality??
    6·2 answers
  • "Create a Python program named detect_column_level_data_entry_errors. When complete, you will run this program to produce a diag
    11·1 answer
  • How a computer encodes text, how it is processed and how computer data is represented.
    6·1 answer
  • Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
    6·1 answer
  • Need help please. this effect my technology
    15·1 answer
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
  • Which step in the software development life cycle involves making improvements based on user feedback?
    15·1 answer
  • The Arizona Department of Transportation has offices throughout the state. State documents are stored on a large server in a cen
    5·2 answers
  • Different search engines available on the internet​
    7·1 answer
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!