1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
14

What are the possible consequences of intentional virus setting?

Computers and Technology
1 answer:
natali 33 [55]3 years ago
3 0

<u>The possible consequences of intentional virus setting:</u>

Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other  to different process  such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop  and tablet.

To avoid or protect the computer there are two type of antivirus.

  • On desktop or tablet or laptop. (It is called resident firewall).
  • Internet gateway. (It is called firewall)

So company create virus and to rectify they make money of that process.

To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.

You might be interested in
A communication medium that carries a large amount of data at a fast speed is called
AveGali [126]
A communication medium that carries a large amount of data at a fast speed is called broadband. Broadband can transmit multiple signals at the same time. The term gained popularity during the 1990s for the marketing of internet. The term is used in radio, television and internet terminology. Though there is slight difference in the definition in each category, the term primarily stands for the ability of a medium to send and receive a lot of data at a fast speed.
4 0
3 years ago
Which of the following must be configured in certain applications to help ensure data aggregation and data isolation are impleme
Hitman42 [59]

Answer: (B) Log forwarding and (F) Zones

Explanation:

 According to the given question, the log forwarding and the zones are the  applications that are configured for ensuring the data isolation and aggregation that are implemented on the various types of critical devices and the applications.

  • The log forwarding is one of the type of application that are used for correlated the various types of events from the multiple resources from the one Forti-analyzer to the another unit.
  • The zones is one of the type of virtual system that are used in multiple resources.

Therefore, Option (B) and (F) is correct.

5 0
3 years ago
Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long
MariettaO [177]

Answer:

Try to use your mobile data but it might use up quite a bit. Also instead of downloading it transfer it to a laptop or a usb stick, or you can upload your photos to the cloud.

6 0
2 years ago
Which type of password would be considered secure
max2010maxim [7]
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
5 0
3 years ago
Read 2 more answers
Write 2 paragraphs. 1 comparing Shrek the movie and Shrek the musical and another contrasting them.
kvv77 [185]
The movie was way better, though the actors in tge musical did a good job. Shrek
8 0
3 years ago
Read 2 more answers
Other questions:
  • Consider this scenario: A major government agency experiences a data breach. As a result, more than 100,000 personal records are
    7·2 answers
  • Routing connects different network segments and decides where __________are sent to
    7·1 answer
  • Which of the following about if statement is true? A. The condition is a Boolean expression B. A Boolean expression is something
    15·1 answer
  • What is the analysis stage in System development life cycle?
    12·1 answer
  • Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
    6·1 answer
  • What do production designers have to have extensive knowledge of when they are involved in the production of a motion picture?
    13·1 answer
  • Please write a Java program to read movies.txt file. (It is in Modules under Chapter Code) Create your own movies.ser file from
    14·1 answer
  • Describe a NIC card and can you have more than one?
    13·1 answer
  • What represents a user’s specific preferences?
    5·1 answer
  • which is a correct procedural step for a webpage to render on a user's browser? an information request is sent to an ip address
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!