1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
6

How can your network be infected with malware or ransomware?

Computers and Technology
1 answer:
maksim [4K]3 years ago
6 0
Answer: Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. ... Crypto ransomware, a malware variant that encrypts files, is spread through similar methods and has also been spread through social media, such as Web-based instant messaging applications.

Also please mark me as brianliest!!
You might be interested in
Write a method named countInRange that accepts three parameters: an ArrayList of integers, a minimum and maximum integer, and re
marissa [1.9K]

Answer:

In Java:

The method is as follows:

public static int countInRange (ArrayList<Integer> MyList, int min, int max) {  

       int count = 0;

       for (int i = 0; i < MyList.size(); i++)  {

           if(MyList.get(i)>=min && MyList.get(i)<=max){

               count++;

           }  

       }

       return count;

 }

Explanation:

This defines the method

public static int countInRange (ArrayList<Integer> MyList, int min, int max) {

This declares and initializes count to 0  

       int count = 0;

This iterates through the ArrayList

       for (int i = 0; i < MyList.size(); i++)  {

This checks if current ArrayList element is between min and max (inclusive)

           if(MyList.get(i)>=min && MyList.get(i)<=max){

If yes, increase count by 1

               count++;

           }  

       }

This returns count

       return count;

 }

To call the method from main, use:

countInRange(v,m,n)

<em>Where v is the name of the ArrayList, m and n are the min and max respectively.</em>

6 0
3 years ago
LDAP is an industry standard employed by Microsoft, which enables IT departments to use a(n) __________ structure when creating
olchik [2.2K]

Complete Question:

LDAP is an industry standard employed by Microsoft, which enables IT departments to use a(n) __________ structure when creating user accounts and user groups.

(a)directory tree

(b)Organizational Unit (OU)

(c)forest

(d)file system

Answer:

(a) directory tree structure

Explanation:

Lightweight Directory Access Protocol (LDAP) is a special type of Directory Access Protocol (DAP) and it is a software protocol that allows the storage and retrieval of data objects (such as user accounts and user groups) that are arranged in an hierarchical directory structure. This hierarchical directory structure is called directory tree or directory information tree.

LDAP stores users and resources information of an organization. These information include usernames, passwords, email, human resource data e.t.c

5 0
3 years ago
Police officers conducting traffic stops on minority drivers more than non-minority drivers is an example of what?
MAXImum [283]

Answer:

Cultural bias

Explanation:

Certain verifiable studies have been made across the United States of America on traffic stops, which revealed significant cases of cultural/racial bias. Black people were 20 percent more likely to be stopped and searched by the police than white people.  

Within a six-year period, starting from 2011, researchers studied over 100 million traffic stops cases which were carried out by twenty-one state patrol agencies.

7 0
3 years ago
Which shooting games is good for low end PC. CSGO or Valorant?​
aleksandr82 [10.1K]

the best choice would be csgo

6 0
3 years ago
Unlike the _____ presentations of the other students in class, Calum's presentation demonstrated a thorough and mature grasp of
finlep [7]

Answer:

immature

Explanation:

3 0
4 years ago
Other questions:
  • You have found an old dusty computer in your basement that you can identify as an original IBM PC. You ask your friend if he kno
    15·1 answer
  • Instructions:Select the correct answer.
    5·1 answer
  • List the applications in the CyberOps menu.
    15·1 answer
  • Which of the following statements are valid in Java? (Assume that console is Scanner object initialized to the standard input de
    15·1 answer
  • The amount of RAM storage is measured in A: GB The rule of thumb that predicts that CPU capacity will double every 2 years is ca
    11·1 answer
  • Consider a router that interconnects four subnets: S1, S2, S3, and S4. Suppose all of the interfaces in each of these four subne
    9·1 answer
  • *
    6·2 answers
  • State the domain and range for the following relation. Then determine whether the relation represents a function. A box labeled
    6·1 answer
  • Que segnifica mmmju?​
    15·1 answer
  • A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute a statement else
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!