1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WINSTONCH [101]
3 years ago
11

You've just received an e-mail message that indicates a new serious malicious code threat is ravaging across the Internet. The m

essage contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of the three files in \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. What should your first action based on this message be?a. Perform a complete system backup.b. Verify the information on well-known malicious code threat management web sitesc. Distribute the message to everyone in your address book.d. Reboot the system.e. Delete the indicated files if present
Computers and Technology
2 answers:
dmitriy555 [2]3 years ago
7 0

Answer:

B.) Verify the information on well-known malicious code threat management web sites

Explanation:

Of course, you should verify the message with reliable sources before taking any actions that could impact your computer. Even if the message seemed legit, it telling you to fiddle with the Windows system folder is a red flag.

anzhelika [568]3 years ago
7 0

B. Verify the information on well-known malicious code threat management web sites.

You might be interested in
Anyone have good websites to cure boredom
Sav [38]

Answer:

cool math if its not blocked

Explanation:

6 0
3 years ago
Read 2 more answers
Use the drop-down menus to match each description to the correct term.
maw [93]

Answer:

unknown

Explanation:

the location of each drop-down menu is not given and the answer choices are not shown as well, if they are it is hard to see, try reposting the question with maybe a bracket set ' [ ] ' to represent the blanks, then below you can number the answers available, such as this

President [ ] was in office during the civil war, after the [ ] won the war, he united the states once again

1st BLANK

Abraham Lincoln

John Adams

George Bush

2nd BLANK

Union

Confederates

British

(i just made up this question, its not any part of any test questions)

i hope this helps you out a lil bit :)

4 0
3 years ago
Read 2 more answers
Given a Fully Associative cache with 4 lines using LRU replacement. The word size is one byte, there is one word per block, and
uranmaximum [27]

Answer:

3 bits

Explanation:

Capacity of main memory=16 Bytes=24

The number of address bits= 4 bits.

The size of the word= 1 Byte=20

The word bits=0.

Number of lines =4

Number of sets required=21

The sets bits is =1

The number of offset bits=20=0

Number of tag bits= total number of address bits - (word bits + offset bits + set bits)

= 4 - 0 -0- 1

= 3 bits

8 0
3 years ago
Subtract 01101011-00101010
White raven [17]

Answer:

Alexa says minus 8

Explanation:

8 0
3 years ago
Read 2 more answers
Relationship between application system<br>.and database​
RideAnS [48]

Explanation:

there is a very close relationship between DBMS and application programs the application programs provide the user-interface to send request to DBSM and to receive processed results from DBMS processes that request and return the results to the application program and also controls and manages the database

3 0
3 years ago
Other questions:
  • In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
    11·1 answer
  • A network administrator is implementing dhcpv6 for the company. the administrator configures a router to send ra messages with m
    6·1 answer
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • What type of machine is a CD player? A. simple machine B. compound machine
    8·2 answers
  • Write a program that asks the user for three strings. Then, print out whether the first string concatenated to the second string
    8·1 answer
  • Why did artists use pinhole cameras during the renaissance?
    8·1 answer
  • When storing used oil, it needs to be kept in ___________ containers.
    12·1 answer
  • How do medical detectives investigate their cases?
    15·2 answers
  • True or false scientists investigate and seek to explain the natural world
    14·1 answer
  • Discussion Topic
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!