1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
6

How can your network be infected with malware or ransomware?

Computers and Technology
1 answer:
maksim [4K]3 years ago
6 0
Answer: Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. ... Crypto ransomware, a malware variant that encrypts files, is spread through similar methods and has also been spread through social media, such as Web-based instant messaging applications.

Also please mark me as brianliest!!
You might be interested in
At what x position are the ellipses drawn??? thanks ♡​
Anna71 [15]

Answer:

55

Explanation:

The xPos variable is set to 55 and they have set the variable in the code for the ellipses in the x position

Hope this helps

7 0
3 years ago
What is the main characteristic of a Peer-to-Peer (P2P) network?
Setler [38]

Answer:

A peer-to-peer (p2p) network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining large amount of routing state. This allows for a variety of applications beyond simple file sharing, including in multicast systems, anonymous communications systems, and web caches.

Explanation:

Not hard at all ma'am.

6 0
3 years ago
Question 1 Which portion of the PuTTY package allows you to perform file transfers using the SCP (Secure Copy) protocol?
Artyom0805 [142]

There are different aspect of computing. The portion of the PuTTY package that allows you to perform file transfers using the SCP (Secure Copy) protocol is pscp.exe.

The pscp.exe tool commonly called the PuTTY Secure Copy Client is known to be the only portion of the Putty package that can let you copy files to and from remote computers through the use of the SCP.

Secure Copy (SCP)  is simply defined as a computer command that one can use in Linux to copy files from one computer to another on a network.  PuTTY is simply known to be a free implementation of SSH (and telnet) used for computer that running Microsoft Windows.

Learn more about the PuTTY package from

brainly.com/question/13171394

8 0
3 years ago
A(n) ________ software installation copies all the most commonly used files to your computer's hard drive.
irinina [24]

Answer:

Full

Explanation:

According to my research on IT tasks, I can say that based on the information provided within the question this type of software installation is called a Full Software Installation. This type of installation is usually done when installing a brand new operating system, which you then need to install all the necessary software that is commonly needed.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Beginning in cell B21, complete the series of substitution values ranging from $35 to $45 in increments of $2.50 vertically down
abruzzese [7]

In order to complete the series of substitution values from $35 to $45 in increments of $2.50, follow these steps:

  • Input $35 in B21.
  • Highlight B21 to B26.
  • Go to the Home tab.
  • Go to the Editing ribbon.
  • Click on Fill.
  • Click on Series.
  • Step Value = 2.50
  • Stop Value = 45.
  • Click Okay.

<h3>How can you complete a series of Substitution values?</h3>

First input the value you are to start with in the cell you are to start with. In this case that means putting $35 in Cell B21.

Highlight B21 to B26 and then go to the Home tab. Go to the Editing ribbon at the bottom right and click on Fill. Then go to Series and input the step value as 2.50 and the stop value as 45. Click okay and the range will appear.

Find out more on spreadsheet functions at brainly.com/question/1395170.

4 0
2 years ago
Other questions:
  • What type of devices are the key board and the mouse?
    10·1 answer
  • ____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast
    15·1 answer
  • 1. [2 points] Write a function to compute the volume of a sphere, given its radius. 2. [2 points] Write a recursive function to
    7·1 answer
  • There is no way to see how another project in Scratch was made.<br><br> True<br> False
    11·1 answer
  • What are the best data structures to create the following items? And why?
    13·1 answer
  • my airpods just do not seem to connect if i try to pair them, reset them, they have this continuous green light, please help me
    12·1 answer
  • Your windows system is used by several people, so you want increase security by requiring users to create passwords that are at
    9·1 answer
  • __________ are hosted on dedicated computers known as 'web servers'.​
    8·2 answers
  • Create a program that finds (n+1)! -factorial- of an integer n in C++.
    13·1 answer
  • KELLY Connect
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!