1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
7

When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated

Computers and Technology
1 answer:
jekas [21]3 years ago
4 0

Answer:

NO

Explanation:

  • No, it's not, when a virus blocks a file stored in a sandbox, it does not affect the system.
  • However, the virus program does not necessarily recognize other parts of the program. It still takes analysis to determine what. Also, the virus vault must be emptied to delete the original files

You might be interested in
How does the post process alert the user if it detects a hardware problem during the post process?
Lesechka [4]
As a Alert down by the bar under where it says start I would think.
6 0
4 years ago
How do productivity programs most benefit the way we work and live?
finlep [7]

Answer:

They provide us with ways to communicate, display, and work with information more quickly and accurately.

Explanation:

Productivity programs helps in the provision of information and they also help in increasing productivity by making work less stressful and unambiguous. Examples of productivity programs include design programs and spreadsheet tools.

These programs also create an avenue for providing us with ways to communicate, display and work with information more quickly and accurately.

6 0
4 years ago
You can get context-sensitive help information from the code editor by
Drupady [299]
Visual Studio* IDE Code Editor.
8 0
3 years ago
Microsoft outlook is one of the most widely used _____ software applications
Marysya12 [62]
Computer: Microsoft Outlook is one of the most widely used computer software application.
7 0
3 years ago
Assign sub_lyric by slicing rhyme_lyric from start_index to end_index which are given as inputs. Sample output with inputs: 4 7
N76 [4]

sub_lyric = rhyme_lyric[start_index:end_index]

8 0
4 years ago
Other questions:
  • Describe a situation where it would be appropriate to use each of the six leadership styles described by Daniel Goleman
    7·1 answer
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • Which of these is NOT a reason why you would print handouts of your presentation?
    14·1 answer
  • Write a program that prompts the user to input a number. The program should then output the number and a message saying whether
    10·1 answer
  • Access Help defaults to searching for information on the _________.<br><br> Not multiple choice
    10·1 answer
  • Marie uses DHTML to create a website for her college. How is DHTML more helpful than HTML?
    13·2 answers
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • What is the point of brainy when other people have to answer your questions but not the cumputer
    9·1 answer
  • Complete the procedure for creating a new appointment by selecting the correct answers from the drop-down menus.
    11·1 answer
  • Which of the statements below are true? Which are false?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!