1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya [120]
3 years ago
11

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and

she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer
Computers and Technology
1 answer:
BabaBlast [244]3 years ago
5 0

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

You might be interested in
When you format text, what are you doing?
vova2212 [387]

Answer:

d

Explanation:

7 0
4 years ago
Read 2 more answers
Which formula is used to measure accuracy?
Westkost [7]

Answer:You can only find REaccuracy if you know the actual “true” measurement… something that's difficult to do unless you're measuring against the atomic clock. The formula is: REaccuracy = (Absolute error / “True” value) * 100%.

Explanation:

7 0
3 years ago
This is an example of what type of formula? <br> =(D1+D17)
stepladder [879]

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

<h3>What are functions in excel?</h3>

There are different ypes of formula functions in excel such as;

  • SUM
  • COUNT
  • COUNTA
  • IF
  • TRIM
  • MAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

Read more about Excel Functions at; brainly.com/question/14042837

5 0
3 years ago
Why does my Office Computer send packet #1? What device responds by sending back packet #2? What information does my Office Comp
AleksandrR [38]

Answer:

The office computer is part of a network.

The server responds with a packet when a request packet is sent by a client.

The computer confirms the IP address and port number to retrieve the encapsulated data, for a specific application in the system.

Explanation:

The computer network is the communication of two or more devices. There are two forms of network, there are peer to peer and client/server networks.

The peer to peer network allows for each computer to send and receive data, while the client/server network have a dedicated server to send resources to clients that request for it. Data transferred are encapsulated in the network, transport and data-link layer PDU headers and would be decided in the destination system to retrieve the data.

4 0
3 years ago
For each of these sentences, state what the sentence means
Xelga [282]

For each of these sentences, the sentence means are:

  • A.) Inclusive OR
  • B.) Exclusive OR
  • C.) Exclusive OR
  • D.) Inclusive OR
<h3>What is a logical connective in writing?</h3>

Logical connectives are known to be some kinds of words or symbols that is known to be often  used to make a complex sentence from two simple sentences and this is often done by linking or connecting them.

Note that some Logical Connectives are said to be If, Only if, When, Whenever, and others.

Hence, For each of these sentences, the sentence means are:

  • A.) Inclusive OR
  • B.) Exclusive OR
  • C.) Exclusive OR
  • D.) Inclusive OR

Learn more about  logical connective from

brainly.com/question/14562011

#SPJ1

5 0
1 year ago
Other questions:
  • The code that follows saves the data that was in the $names array as
    13·1 answer
  • After reading passage “the incredible machine” why do you think the article has been titled so?
    13·1 answer
  • ____ is an approach to boundary spanning which results from using sophisticated software to search through large amounts of inte
    5·1 answer
  • Discuss the infrastructure necessary for the Internet of Things and Cloud computing to exist. What unique services does this ena
    7·1 answer
  • _____ are the most fundamental components of designing a training program that determine the amount of stress placed on the body
    6·1 answer
  • A 9-year old male castrated Westie presents on emergency after being rescued from a house fire. On presentation, the dog has a r
    9·1 answer
  • The __________ on a mouse is used to select or place the cursor where you want on the page
    13·1 answer
  • What is an example of a one-to-many relationship?
    9·2 answers
  • Ian’s photography teacher asks him to take some photos of a few different species over the weekend. Which group of photos would
    12·1 answer
  • Write the steps involving coping and pasting a file in a folder​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!