1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
6

How can your network be infected with malware or ransomware?

Computers and Technology
1 answer:
maksim [4K]3 years ago
6 0
Answer: Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. ... Crypto ransomware, a malware variant that encrypts files, is spread through similar methods and has also been spread through social media, such as Web-based instant messaging applications.

Also please mark me as brianliest!!
You might be interested in
What are the common causes of signal loss in fiber optic cable connectors
timurjin [86]
Bending, twisting, or the overall age of the cable, or other stuff like that.
8 0
3 years ago
Jonathan works with a team of graphic designers. They have a collection of images and have divided the image editing work among
kondaur [170]

Answer:

A, USB

Explanation:

5 0
4 years ago
Read 2 more answers
Write a function called printbackwards() that will work with a c++ string. the function will print any c++ string backwards. you
dangina [55]
Hi!

Well, this isn't exactly a question - but rather just a request. However, I'm going to attempt to try and <em>describe </em>to you how to approach this problem, instead of just writing the code for you and sending you on your way.

So, what's our general base goal here? We want to take a string into a function, and then print it out backwards. Seems simple enough!

Right away, we already have an idea how to set this code up. We need a main method which will call <em>PrintBackwards(), </em>which will have to take a parameter of type string. 

This would look something like <em>PrintBackwards(string baseString). </em>Inside this method, we'd have to do something so we can see each character in this string and then store it in a new string. 

I encourage you to try and tackle this on your own, but I can give you an idea. We can have a new valueless variable called reversedString, which will store our baseString but backwards.

We could try looping through the baseString for each character it possesses, and then keep adding onto our reversedString by doing something like +=. What I mean, is we'd access the very last index of baseString, and then keep appending characters into it. 

So our loop would look something like <em>for(int i = baseString.length; i > 0; i--) {}. 

</em>I haven't used C++ in awhile, so you'll have to find the specific syntax requirements. But with that loop, i represents the index of each character in baseString. It starts with the last index, and keeps going down in reverse.
<em>
</em>Inside our loop, we could do something like reverseString += baseString.index(i); Again, I don't remember the specific syntax - so you'll have to do this on your own.
<em>
</em>Hopefully, this helps! =)<em>
</em>
6 0
3 years ago
Assign test_stat_72 to the value of the test statistic for the years 1971 to 1973 using the states in death_penalty_murder_rates
Alika [10]

Answer:

Find attached below the solution and explanation to the problem.

Explanation:

3 0
4 years ago
Why does a computer not understand physical variables (real world) read from sensors?
ohaa [14]

The reason why a computer does not understand physical variables read from sensors because they are only capable of having to handle and work on analogue and in order for them to understand, a digital converter is needed by the device in means of having to understand the given data.

5 0
3 years ago
Other questions:
  • Thomas is using a drawing program to complete a construction. Which construction could he be completing? (5 points).
    5·2 answers
  • Write a program that accepts a whole number as input, multiplies that number by 12, and then outputs the product
    5·2 answers
  • A document called a system requirements report describes the objectives for the information system.
    12·1 answer
  • It is vital to the organization and the success of the disaster recovery plan that the plan be thoroughly tested on a(n) _______
    5·1 answer
  • What is the keyboard shortcut to display the merge to printer dialog box?
    5·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • You suspect that an attacker has hidden files on your machine. What Linux command would you use to search for files with a file
    14·1 answer
  • What features do plain text editors support?
    12·1 answer
  • Choose the term described. : a value that can be passed to a function
    9·1 answer
  • A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!