1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
14

What are the possible consequences of intentional virus setting?

Computers and Technology
1 answer:
natali 33 [55]3 years ago
3 0

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

You might be interested in
You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and sett
Over [174]

Answer: The pharmacies and the employee and  patient  must be examined during the investigation.

Explanation:

8 0
3 years ago
An Agile Team decides they want to use pair programming in future Iterations. Where should this be captured? g
Umnica [9.8K]

Answer:

The decision to use pair programming by an Agile Team should be captured in their <em>Inspect and Adapt meeting notes.   </em>

Explanation: The underlying principle for having an agile team that the team is committed to constant incremental and or progressive improvement.

Inspect and Adapt Meeting Notes are notes which hold the summary of past achievements which hold and records of things to do going forward in order to ensure that there is progress and improvement over the last set of objectives.

These notes are usually taken at the Inspect and Adapt meeting. This is simply a meeting held at the end of each project milestone. An agile team during this meeting will review its performance, agree and document how it can be more effective.

Pair programming is also an Agile practice in the parlance of software development. Instead of the regular method where an individual is tasked with the development of an application, in this case, two programmers are tasked with the development of one App.

Sometimes this method is used during Extreme Programming (XP)

Cheers!

7 0
3 years ago
What resources can be shared over a computer network?
quester [9]

Answer:birthday

Explanation:

4 0
3 years ago
Read 2 more answers
Make a ladtract class that has 2 fields, one for the tractor's length and one for the width. The class should have a method that
Virty [35]

Explanation:

Below is the java code for the ladtract class :-

public class ladtract

{

private double length;  //length of tractor

private double width;   //width of tractor

public double calculateArea(){  

    return length*width;    //calculate and return the area of the tractor

}

public boolean equals(Object o) {

    if (o == this) {    //check if it's the same object

        return true;

    }

       if(o.length==this.length && o.width==this.width){   //check if the length and width are same for both objects

           return true;

       }

       return false;  

}

public String toString(){

    return "Area="+calculateArea(); //return the area of the tractor as a string

}

}

7 0
3 years ago
You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence
Lorico [155]

To deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

<h3>What is orphaned accounts?</h3>

The orphaned accounts are the accounts which do not have any valid business owner but provide the access to the services and corporate systems. One best way to deal with such account is to disable the user account.

Steps to deal with orphaned accounts-

  • Using the automated provisioning and deprovisioning can save the
  • Control the accounts with micro-certification.
  • Regular check of account to prevent the hidden access risk.

You have been hired as a security administrator. While analyzing your organization's personnel policies, you notice the presence of multiple orphaned accounts.

In such case, one should disable these accounts.

Thus, to deal with presence of multiple orphaned accounts as a security administrator in an organization, the user accounts should be disabled.

Learn more about the orphaned accounts here:

brainly.com/question/11211623

#SPJ1

8 0
2 years ago
Other questions:
  • 2. You have classes to represent different shapes (see below). You realize you can benefit from inheritance and polymorphism by
    13·1 answer
  • Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
    11·1 answer
  • What does CMOS stand for?
    15·2 answers
  • If you want to distribute a formatted Microsoft word document to people who don't have word save it as a __file
    5·1 answer
  • Refer to the exhibit. All workstations are configured correctly in VLAN 20. Workstations that are connected to switch SW1 are no
    14·1 answer
  • In programming, what is an integer number?
    14·2 answers
  • My friend has a battery of 9000mah and loses 10 every day how many days well it take to go to zero
    13·1 answer
  • What alternative to leased lines is used by VPNs? As an alternative to leased lines, VPNs use ______ connections.
    11·1 answer
  • 1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
    8·2 answers
  • Consider Emily's balance statement:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!