1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
galina1969 [7]
3 years ago
10

John has had a message pop-up on his computer asking him to pay $800 to have his files

Computers and Technology
2 answers:
Kay [80]3 years ago
6 0
1. Downloaded any file that could have the ransomware.
2. Intentionally install the ransomware itself.
3. He might be connected to a public Wi-Fi
faltersainse [42]3 years ago
3 0

• Installed a program containing ransomware/malware. (Do not accept downloaded without inferring it was installed)

• Opened an email attachment containing malware.

• Opened a file containing a malicious macro.

• Left his computer unsecure allowing someone else to install malware on it. (Should include an example, e.g. not logging off)

You might be interested in
Liza works as a receptionist. Around the lunch hour, she has a difficult time hearing the callers due to employees talking near
Rashid [163]
c.<span>barriers to communication
 because the other employees are the ones causing the trouble</span>
6 0
2 years ago
3. Touch screens are both input and output devices. Describe one application where a touch screen is used as an output device. (
defon

Answer:

Mobile phone

Explanation:

Hopefully this is right

7 0
3 years ago
Read 2 more answers
Which of the following is a group of computer systems and computing hardware devices linked together through various communicati
Art [367]
Digital network, as it refers to the series of connected and linked computing devices into a network as described in this question.
6 0
1 year ago
Question # 4
arlik [135]

Answer:

Explanatio Morse code

4 0
2 years ago
A Venn diagram is used to show...?<br> Plz help
11Alexandr11 [23.1K]
Venn diagrams are used to depict set intersections (denoted by an upside-down letter U)......
6 0
3 years ago
Read 2 more answers
Other questions:
  • While browsing through the mall, you are given samples of the latest perfumes from different designers. This is an example of wh
    14·1 answer
  • Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in t
    12·1 answer
  • What are the elements of an autobiographical narrative similar to those of a short story?
    7·1 answer
  • A client-server relationship is the basic form of a ____?
    15·1 answer
  • A(n) ____ is a request for specific data from a database.
    9·1 answer
  • Where can I watch infinity war for free?
    9·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • What is the correct html for referring to an external style sheet?
    11·1 answer
  • What finger should be on the Y key?
    12·2 answers
  • The development of online capabilities created the ________, an information- and communication-based electronic exchange environ
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!