1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
3 years ago
7

PLS HELP IM SO DESPERATE!! 40 points

Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
8 0
You would reboot the computer install a VPN and a virus detector
You might be interested in
which of the following are good ways for virtual team members to get to know one another? (choose every correct answer.)
pav-90 [236]

what are the choicess

8 0
2 years ago
A(n) _____ is created using the select and option elements that present users with a group of predefined possible values for the
aniked [119]

Answer:

c. selection list.

Explanation:

A selection list is created using the select and option elements that present users with a group of predefined possible values for the data field.

In Computer programming, the selection list is used to avail the end users with the ability to engage in an operation such as a predefined possible values for the data field.

7 0
3 years ago
My laptop volume has got really low all of a sudden. It wasn't the best to start with but now i can barely even hear it at 100%.
nadezda [96]

Answer:

make sure the speaker is clean and you volume setting is on normal there is alot of setting for deaf people so make sure that is correctly

4 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Jim has entered the age of each of his classmates in cells A1 through A65 of a spreadsheet.
alexandr402 [8]
The answer to this is B=MODE(A1:A65)
8 0
3 years ago
Other questions:
  • "Dean wants a quick way to look up staff members by their Staff ID. In cell Q3, nest the existing VLOOKUP function in an IFERROR
    10·1 answer
  • What precaution can you take while using a social networking site to prevent a data breach?
    15·1 answer
  • ______ includes websites that encourage interaction and connection among people, businesses, and organizations.
    9·2 answers
  • How can you make a circle in JavaScript? Thank you!
    9·1 answer
  • How to check what level you are in runescape?
    9·2 answers
  • A superscope is a special type of scope that allows a dhcp server to service multiple ipv4 subnets on multiple physical networks
    7·1 answer
  • Which best describes a difference between transcription and DNA replication
    8·2 answers
  • Word documents contain how many sections by default?
    9·1 answer
  • What is considered appropriate dress for men and women in the workplace? Select all that apply.
    6·2 answers
  • Which branch of science helps avoid or minimize stress-related injuries at workplace?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!