1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
2 years ago
8

You notice that lately your computer has been running slow. When you open up your web browser, you get endless pop-up ads to the

point you can't surf the web effectively, and your browser's home page displays an ad every time you open it. Now, recently, each time you search, using your search engine, you notice that your results are being manipulated. Which of the following categories of malware best represents the behaviors you are experiencing?
Computers and Technology
1 answer:
Vlad [161]2 years ago
4 0

Answer:

Spyware

Explanation:

The reason why you noticed your computer has been running slow is because of spyware, which is considered to be very bad to get on your computer. When a user opens his/her web browser, the user receives ads that are misleading to the user, which fools the user of thinking it's something real and not a scam. Not only that, the user also receives pop-up ads that can, as mentioned, trick the user to think that it's real and not fake. Finally, the user's search results will be manipulated. In conclusion, spyware is, in fact, the main cause of the scenario.

You might be interested in
The CMOS battery located on a computer's motherboard allows for maintaining the correct time and date information stored in CMOS
siniylev [52]

Answer:

True                

Explanation:

  • CMOS (complementary metal-oxide-semiconductor) is a chip which is placed on the motherboard in order to store the system date and time and this is powered by a CMOS battery which is housed inside this chip and is used to manage the date and time when the system is off.
  • This is a long lasting battery which can work till the life of a motherboard.
  • This battery is also used to maintain BIOS settings and hardware settings and BIOS uses it during the booting process in order to retrieve the stored information regarding the hardware or system date time.
  • CMOS chip is basically volatile and cannot retain settings information when the computer system powers off but the CMOS battery helps to maintain these setting just like system time and date when the computer gets shut down.
4 0
3 years ago
The superclass Calculator contains: a protected double instance variable, accumulator, that contains the current value of the ca
yawa3891 [41]

Answer:

The following program are written in JAVA Programming Language.

//inherit the Calculator class

public class CalculatorWithMemory extends Calculator {  

   private double memory = 0.0;    //initialize double type variable

   public void save() {   //define function

       memory = accumulator;    

   }

   public void recall() {   //define function

       accumulator = memory;

   }

   public void clearMemory() {   //define function

       memory = 0;     //initialize the value

   }

   public double getMemory() {  

       return memory;    // return the value in "memory" variable

   }

}

Explanation:

Here, we inherit the property of the "Calculator" class.

Then, we define the private double type variable "memory" and assign value 0.0.

Then we set the function "save()" inside it we assign the value of "memory" in "accumulator" and close the function.

Then, we define the function "recall()" inside it we assign the value of "accumulator" in "memory" and close the function.

Then we set the function "clearMemory()" inside it we assign "memory" to 0.

After all, we set the double type function "getMemory()" inside we return the value of the "memory".

7 0
3 years ago
3. The following code will not display the results expected by the programmer. Can
Elena L [17]

Answer:

ion k

Explanation:

7 0
3 years ago
ARP only permits address resolution to occur on a single network.could ARP send a request to a remote server in an IP datagram?w
romanna [79]

Answer:

The answer to this question is Yes it is possible

Explanation:

It can be done In the case where a special server is required in each network that would forward the request to the  remote ARP(Address Resolution Protocol) server and will receive the response from the server and send it to the requesting host.So we conclude that we can do that hence the answer is Yes.

5 0
3 years ago
In a multiple-column record of a data file, ______ represent different variables and _______ represent different cases
Nookie1986 [14]

Answer:

columns, rows

Explanation:

In Computer programming, a atabase schema refers to the logical design of the database while the database instance refers to a snapshot of the data found in a database at a given instant in time.

Basically, in database management, the term "schema" is used to denote a representation of data while the term "instance" is used to denote an instance of time.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

Also, a database instance is a snapshot of the data in the database at a given instant in time and as such represents an operational database by following the conditions, validation and constraints set for a database management system.

These data can be stored or organized in a database management system through the use of multiple-column record formats.

In a multiple-column record of a data file, columns represent different variables and rows represent different cases (respondents) such as experimental data, independent observations etc.

4 0
2 years ago
Other questions:
  • how do you make a circuit so 1 switch will turn on/off all the lights(3 lights) and a second switch will change the lights from
    14·2 answers
  • Xml is used to format the structure and style of a web page. true or false
    7·1 answer
  • Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
    9·1 answer
  • . Given an initially empty stack s that accepts integers, the following operations are performed: s.push (10) s.push (20) s.push
    13·1 answer
  • What is runtime error in Python? Provide an example
    14·1 answer
  • Phoebe has to give a permission about recycling. Where should she look while presenting?
    11·1 answer
  • Then standard toolbar appears whenever you select text true or fals
    15·1 answer
  • A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the developm
    11·1 answer
  • If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
    6·1 answer
  • Pleaseeeeeeee tellllllllllllllllllllll​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!