<span>Hi...
There are three answers .....
If the flash drive has a custom icon then there is hidden files on the flash drive.
An autorun.inf file and a small .ico image file .....
( Click organize > Folder and search options >View>Show hidden folders and files. )
If the flash drive displays a windows created icon the source directory's are..
%SystemRoot%\system32\SHELL32.dll
%SystemRoot%\system32\imageres.dll
If the Flash drive has a custom icon stored on the computer the "original source file " could be any ware.
The image preference retained in AppData..
Select flash drive >Right click>Properties>Customize , i take a good ICT course, can u make this the brainliest?</span>
Answer:
Trace topology is also referred to as tree bus topology.
Explanation:
There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.
- Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.
Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.
Learn more from
brainly.com/question/24069038
Answer: D) CCSA
Explanation: THE CHECKPOINT CCSA(CERTIFIED SECURITY ADMINISTRATOR) is a computer based certification offered by different Computer Institutions in order to equip computer experts or systems engineers on the activities or process or knowledge needed to enhance the security domain of computer systems.
Check Point Firewall is a component of the Software Blade architecture which provides advanced firewall features like VPN and mobile device connectivity.
Answer:
The answer is false
Explanation:
Please give me brainliest so I can post my artwork