Antivirus programs to detect and eliminate viruses such as Malwarebytes, Stinger, etc.
A hard drive to backup all of his remaining files.
Corrupted files are not always possible to recover, but it's worth a try using a software such as Recuva.
Yes it is safe to tape down cords such as internet cables to the floor
<u>Explanation:</u>
Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.
To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.
Answer:
To catch mistakes the spelling and grammar check will not catch.
Explanation:
Grammar and spelling check is not always perfect!