1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
14

What are the possible consequences of intentional virus setting?

Computers and Technology
1 answer:
natali 33 [55]3 years ago
3 0

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

You might be interested in
Its not letting me change my email, any way to fix this? Must include steps and how to fix this. (I am using a school email) ANS
AlexFokin [52]
You see, you just aren’t philosophical enough to understand an email. You don’t change the email, it changes you.
3 0
2 years ago
5: what privacy issues have arisen with webcams in mobile devices?
AnnZ [28]

What are the privacy issues that have arisen with webcams and mobile devices? People secretly record and broadcast other people without their permission.

3 0
3 years ago
Lisa has a section of her document that she would like to include in the index. Which option should Lisa choose?
kupik [55]

Answer:

For including a part of the text within the index, you need to make use of the Mark Entry option. And here you can fill the required information for curating your index, you need to just follow the instruction as required, and you will be fine.

Explanation:

Please check the answer.

8 0
3 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Imagine you are having a conversation about simulation training programs with one of your friends (it is a slow night). You are
Marina86 [1]
I'd simply say that everyone has their own opinions. Some people don't want to experience it in real life because they fear they may mess up. Hence why we have simulations of things, to help people who don't want to experience something in real life and prepare them for when they decide to go out and actually do it.
3 0
4 years ago
Other questions:
  • Why is it critical to provide proper treatment for minor and moderate sports injuries within the first 48 hours after sustaining
    14·1 answer
  • Please what's the answer to this
    14·1 answer
  • What is autofill in a excel spreadsheet?
    7·1 answer
  • Which of the following is 1000 of a second​
    15·1 answer
  • Write a program called DeliveryCharges for the package delivery service. The program should use an array that holds the 10 zip c
    10·1 answer
  • When there is a limited amount of a product, such as rare art or collectible
    13·1 answer
  • Given a variable s associated with a str, write an expression whose value is a str that is identical except that all the letters
    15·1 answer
  • When mehtod X calls method Y , method Y called methhod Z, and method Z calles method X, this is called
    9·1 answer
  • What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?
    6·1 answer
  • Tulio is editing his video. He used the Trim Video tab. Tulio most likely changed the
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!