1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
3 years ago
11

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and

she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer
Computers and Technology
1 answer:
BabaBlast [244]3 years ago
5 0

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

You might be interested in
Which of the following is where you can save, select a template, change document properties, and close or exit excel?
Aneli [31]
It is the 'backstage' in which you can <span>save, select a template, change document properties, and close or exit excel</span>
5 0
3 years ago
In python, what is the difference between a dictionary and a set? How are they similar?
yuradex [85]

Answer:

"A set is an unordered collection. A dictionary is an unordered collection of data that stores data in key-value pairs."

Explanation:

Set =>

Collection of non-repetitive elements.

Unordered

Unindexed

No way to change items.

Dictionary =>

Collection of key-value pairs.

Unordered

Indexed

Mutable

4 0
2 years ago
How can these requirements be met? Universal Containers conduct evaluations of their sales reps using a custom object consisting
Rudik [331]

Answer:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security

Explanation:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security.

The reason the answer is B is because if access is provided through a hierarchy, it will give access to all the users at the higher manager role for the records of every executive. Also the options provided do not state clearly if Grant access using hierarchy is also checked so we cant assume that.

4 0
4 years ago
Store shelves are empty during periods of Excess Demand. What is another term for Excess Demand?
Sunny_sXe [5.5K]
The answer is B, Shortage
6 0
3 years ago
Which gauge indicates the total number of miles your car has been driven since it was manufactured? A. The speedometer B. The ta
In-s [12.5K]
The answer is C. The odometer

<span />
6 0
3 years ago
Read 2 more answers
Other questions:
  • _ includes websites that encourage interaction and connection among people, businesses, and organizations. A. News sites B. Sear
    5·2 answers
  • propose,two new ,proudly South African ways,which you can visualize that the IoT,can be used at work to make life better.
    12·1 answer
  • "Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that de
    10·1 answer
  • Widgets are ___________ a. objects b. icons c. functions d. components
    11·1 answer
  • If x window system is installed, linux users can use x11 forwarding to run __________ as they would on a windows computer. gui a
    11·1 answer
  • Assume that c is a char variable has been declared and already given a value. write an expression whose value is true if and onl
    6·1 answer
  • Which term describes the gallery that allows you to customize and format text as a graphic? Pull Quote Text Box WordArt Drop Cap
    13·2 answers
  • Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user h
    5·1 answer
  • Write a structured algorithm that prompts the user to input the name and price of an item and the quantity purchased. It should
    10·1 answer
  • ________ is the use of information technology to support the sharing of content among networks of users.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!