1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
QveST [7]
4 years ago
13

Identify measures to protect your computer against threats from human actions. The system administrator informs you that a Troja

n horse has infected your computer. Which program did the system administrator use to determine this?
Computers and Technology
1 answer:
FrozenT [24]4 years ago
5 0

Answer:

Antivirus is that program which helps the system administrator to determine the Trojan horse.

Explanation:

The Trojan horse is the malware which fools the system administrator is that file cannot harm your device.

Trojan is the type of virus that allows hackers to remotely control and access your system. This virus can decrease the performance of your device and your system is not working properly and popups and the advertisements can interrupt your browser.

Precautions:

Firstly, ensure that the Trojan antivirus is installed and running on your computer.

All the software of your system is up to date to its latest version.

And never download and install any file from that site which is not fully trusted.

You might be interested in
When you are creating a game you plan to sell online and you need to implement art:
Lilit [14]

Answer:

you can download images that the creator has given permission to use freely.

Explanation:

5 0
3 years ago
Read 2 more answers
What command is used to generate an RSA key pair?
Leokris [45]

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [<em>labelkey-label</em>] [exportable] [modulus <em>modulus-size</em>] [storage <em>name of device</em>:][redundancy][on <em>name of device</em>:],

with each parameter having its description

5 0
3 years ago
A digital footprint is .
BlackZzzverrR [31]

Your digital footprint is the trail of 'electronic breadcrumbs' you leave behind when you use the internet. It can include the websites you visit, the photos you upload and your interactions with other people on social networks.

3 0
3 years ago
The following program results in a compiler error. Why? int FindMin(int a, int b) { int min; if (a &lt; b) { min = a; } else { m
Mila [183]

Answer:

The answer is "Variable min is defined in the "FindMin()" method, but is used in the main method".

Explanation:

Following are the correct code to the given question:

#include <iostream>//header file

using namespace std;

int FindMin(int a, int b) //defining a method FindMin that takes two integer parameters

{

   int min; //defining integer variable

   if (a < b) //use if to check a value less than b

   {

       min = a; //holding smallest value in min

   }

   else //defining else block

   {

       min = b;//holding smallest value in min

   }

   return min; //return min value

}

int main() //defining main method

{

   int x,y,min; //defining integer variable

   cin >> x; //input value

   cin >> y; //input value

   min = FindMin(x,y); //holding method return value in min variable

   cout<<"The smaller number is: "<<min<< endl; //print method value with message

   return 0;

}

Output:

Please find the attached file.

In the code, a method "FindMin" is defined that takes two integer parameters "a,b" and inside the method, an integer variable "min" is declared that uses a conditional statement that checks the smallest value that store in the min variable and return its value.

In the main method, three integer variable is declared in which two is used for hold value from user-end pass into the method and store its return value in min variable and print value with the message.

7 0
3 years ago
A disciplined, creative, and effective approach to problem solving is needed for project success. The nine-step approach to prob
KatRina [158]

Answer: Determine the most popular solution.

Explanation:

Some of the approaches to problem solving that are listed here include:

• Gather data and verify the most likely causes.

• Revise the project plan.

• Evaluate the alternative solutions

To solve a problem, one needs to gather the data and verify the likely causes of the problem. This can be done by asking questions, running test, interviewing people, running tests, reading reports, or analyzing data.

The project plan can also be revised. Likewise, when one comes with different solutions, one should weigh the cost and benefits of each in order to choose the best solution.

Determine the most popular solution isn't a correct option.

6 0
3 years ago
Other questions:
  • What is the term for the process of swapping items between memory and storage?
    5·2 answers
  • Why is it not advisable to mark tlc plates with a pen to indicate?
    12·1 answer
  • Assignment 3: Chatbot
    11·2 answers
  • One of the prominent movies released in the 1950s is
    15·2 answers
  • Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() fu
    6·1 answer
  • Which of the following is an example of metadata about a webpage?
    7·2 answers
  • State and explain five misused of science and technology​
    12·1 answer
  • Give one of user responsibility of the internet you should follow in cyberethics.
    5·2 answers
  • An app ________ is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or fre
    14·1 answer
  • A time management tool in a help desk software package probably has the greatest impact on the productivity of _____.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!