1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
6

What is a main cause of a virus on a computer

Computers and Technology
1 answer:
horrorfan [7]3 years ago
3 0
<em>The main cause of computer viruses is putting an infected USB flash drive into your computer, opening an infected email, going to websites that are dangerous, and downloading infected files Some viruses disguising them self's as pop-ups. Files that could have downloaded themselves while you are on theses dangerous websites are viruses as well.</em>
<em>Be carful and make sure you don't do anything to deal with these! ;)</em>
You might be interested in
Choose ALL guidelines listed below pertaining to fair use.
tino4ka555 [31]

Answer:

Introduction

As you write blog posts, you may find that you want to include images you find online. Or maybe you found a great piece of writing—a recipe, a story, or a review—that you want to highlight on your own blog. It's important to know that almost all of the content you find on the Web belongs to someone. Just because you can take images, text, and more from other sites doesn't mean it's right to do so—ethically or legally.

In this lesson, you'll learn about the copyright protections that apply to work posted online. You'll learn about the rules that determine which images and text you can use, and how you can use them. You'll also learn how to protect the content you create.

The laws discussed in this lesson are United States laws. No lawyer was involved in preparing this lesson. We are not legal experts, and this lesson should not be taken as legal advice.

Understanding copyright

Copyright is the legal concept that works—art, writing, images, music, and more—belong to the people who create them. According to copyright law, any original content you create and record in a lasting form is your own intellectual property. This means other people can't legally copy your work and pretend it's their own. They can't make money from the things you create either.

To use, copy, or change a copyrighted work, you need permission from the person who holds the copyright. This permission is called a license. Even though everyone has the right to require that others respect their copyright and ask permission to use their work, some people and organizations choose to license their content more freely. They do this by giving their work a Creative Commons license or by placing their work in the Public Domain.

6 0
3 years ago
Read 2 more answers
Identify a major drawback of browsing web pages on mobile devices.
Pavlova-9 [17]
It was way too much of a drawback
5 0
3 years ago
The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software
lutik1710 [3]

Answer:

1)  Layer 4, transport

2) Layer 2, datalink

3) Layer 5, session

4) Layer 7, application

Description of Problems are as below:

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Explanation:

OSI Model is a reference model to determine how applications communicate over a network. OSI consists of seven layers, and each layer performs a particular network function. The seven layers are:

   Layer 7 - Application.

   Layer 6 - Presentation.

   Layer 5 - Session.

   Layer 4 - Transport.

   Layer 3 - Network.

   Layer 2 - Data Link.

   Layer 1 - Physical.

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

Layer 4, transport

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

Layer 2, Data Link

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

Layer 5, session

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Layer 7, application

7 0
3 years ago
Does anyone play genshin impact here?
Reika [66]
Answer


NO sorry
Have a great day
6 0
3 years ago
Read 2 more answers
Microsoft <br> Excel Module 6
Sonbull [250]

Answer:

what Is your question?

6 0
3 years ago
Other questions:
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • Write a method that checks whether the input string or a sentence (a string with spaces) is a palindrome or not. The method shou
    13·1 answer
  • Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as i
    10·1 answer
  • Ned and mary ann are saving their files to a cd
    15·1 answer
  • Define a function below, sum_numeric_vals, which takes a single dictionary as a parameter. The dictionary has only strings for k
    12·1 answer
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • ...................You like swamps
    13·2 answers
  • Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on
    5·1 answer
  • Could anyone help me with this assignment please?
    6·1 answer
  • Who is katie and why is she deleting my answers
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!