1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
7

When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated

Computers and Technology
1 answer:
jekas [21]3 years ago
4 0

Answer:

NO

Explanation:

  • No, it's not, when a virus blocks a file stored in a sandbox, it does not affect the system.
  • However, the virus program does not necessarily recognize other parts of the program. It still takes analysis to determine what. Also, the virus vault must be emptied to delete the original files

You might be interested in
Simple geometry can compute the height of an object from the the object's shadow length and shadow angle using the formula: tan(
agasfer [191]

Answer:

The program to this question can be given as:

Program:

#include <stdio.h>  //include header files

#include<math.h>

int main()    //main method  

{        

   double treeHeight = 0.0;         //declare variables

and assign value

   double shadowLength = 0.0;  

   double angleElevation =  0.11693706;

   // (0.11693706 radians = 6.7 degrees) convert number into angle.      

   shadowLength = 17.5;  

treeHeight = shadowLength * tan(angleElevation);   //convert number into angle

   printf("Tree height: %lf\n", treeHeight);   //print value.

   return 0;  

}

Output:

Tree height: 2.055778

Explanation:

In the above C language program firstly we include the headers. In this header file, we include a (math.h) header file this file helps to use the math function. Then we declare the main method in the main method we declare the variable that is given in the question that are treeHeight, shadowLength , angleElevation. All the variable datatype is double because it stores the floating-point value. Then we apply the formula that is  treeHeight = shadowLength * tan(angleElevation). In this formula, the treeHeight variable holds the value. Then we print the variable value for print the double value we use the lf(that is long float).

7 0
4 years ago
When computer users have trouble with their machines or software, Roland is the first person they call for help. Roland helps us
Schach [20]

Answer:

The correct answer is A) Support Analyst

Explanation:

From the question, we can see that Roland is familiar with both machines and software. He is familiar with the operations of both parts of a computer to the end that he can attempt a fix. And if he can't he knows who to refer the end-users to. Usually, some IT personnel that is more experienced.

From the above points, we can safely say that Roland is an IT Support Analyst. He cannot be the Systems analyst because Systems Analysts are usually at the top of the Pyramid. They take on problems that are referred upwards to them from support analysts.

Cheers

3 0
3 years ago
Explain the procedure you will undertake to create a new partition​
MA_775_DIABLO [31]

To create a partition from unpartitioned space follow these steps:

Right click This PC and select Manage.

Open Disk Management.

Select the disk from which you want to make a partition.

Right click the Un-partitioned space in the bottom pane and select New Simple Volume.

Enter the size and click next and you are done.

8 0
3 years ago
Define latency and jitter for service flow in a fixed wireless system.
Marianna [84]

Answer:

Jitter refers to deviations in displacement of or deviation in the signal pulses in a HF digital signal. Latency  refers to the time interval between the response and stimulation or the basic delay between the effect and cause in service flow.

Explanation:

4 0
3 years ago
Read 2 more answers
How do you do this question?
svet-max [94.6K]

Answer:

int k=0;

for(int i=0;i<=13; i++)

{

   if (table[i].getKey().equals(key))

   {

             k=i;

   }

   else

  {

             continue;

  }

}

 V value= table[k].getValue();

return value;

}

   

Explanation:

Note table[i] is an entry, and we know the key as it is an argument input to the function. Hence, we find the entry position using the given key, and then find the corresponding value and return it. And this is what is required. There are 14 entries in this hashtable, as known from the question.

6 0
3 years ago
Other questions:
  • Why does this say I'm in middle school?
    11·1 answer
  • Write the steps for displaying multiple subtotal functions in excel.
    10·1 answer
  • (50 points) Write a program arrays1.cthat checks if two integer arrays are different by one and only one elementwhen compared el
    5·1 answer
  • FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i
    7·2 answers
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • For question 1-3, consider the following program: def tryIt(a ,b = 7) return a + b
    8·1 answer
  • Composition means ________. a)that data fields should be declared private b)that a class extends another class c)that a variable
    6·1 answer
  • PLZ help
    5·1 answer
  • THis took FOREVER! please go check it out, if you have seen my demo to this game, you will like the full version! https://scratc
    9·2 answers
  • The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addres
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!