1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
3 years ago
11

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and

she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer
Computers and Technology
1 answer:
BabaBlast [244]3 years ago
5 0

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

You might be interested in
Which of the following is non-volatile storage?
gulaghasi [49]
Primary because it is non-volatile storage
6 0
3 years ago
Annie needs to provide a form field that will allow users to select from a predefined list of options but without the ability to
Lana71 [14]

Answer:

Drop down list

Explanation:

You have not listed what the possible answers are, however a drop down list would be an option to accomplish this.

8 0
3 years ago
What name is given to the method used to copy a file onto a CD
Romashka-Z-Leto [24]

Answer: Burn or Write

Explanation:

Burn is a colloquial term meaning to write content to a CD , DVD , or other recordable disc. DVD and CD drives with recording capabilities (sometimes called DVD or CD burner s) etch data onto the disks with a laser .

4 0
3 years ago
n a​ poll, 6767​% of Internet users are more careful about personal information when using a public​ Wi-Fi hotspot. What is the
a_sh-v [17]

Answer:

The probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot is 0.964

If the survey subjects <em>volunteered</em> to​ respond , then those with the strongest opinions are most likely respond. The survey sample is then not randomly selected, the survey may have a <em>response bias.</em>

Explanation:

Let P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) denote the probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot, then we have the equation

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) = 1 - P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot)

  • If 67​% of Internet users are more careful about personal information when using a public​ Wi-Fi, then 33% of them are not.

P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot) = 0.33^{3} ≈ 0.036

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot)  = 1 - 0.036 = 0.964

4 0
3 years ago
What is the organizational management practices on planning during a pandemic like corona virus.
eduard

Answer:

wear a mask use hand sanitizer dont get in contact with anyone between 6 feet

Explanation:

3 0
3 years ago
Other questions:
  • Cuales son los accesorios electronicos mas recomendados?
    6·1 answer
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the
    14·1 answer
  • In Python what are the values passed into functions as input called?
    13·1 answer
  • Consider the following method:
    14·1 answer
  • Write bubblesort algorithm using random programming language
    13·2 answers
  • Which panel is used to make a website​
    8·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
    11·1 answer
  • Dynamics
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!