1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
11

Choices.

Computers and Technology
1 answer:
Svet_ta [14]3 years ago
7 0

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

You might be interested in
Sarah has entered data about football players from team A and team B in a worksheet. She enters names of players from team A wit
deff fn [24]
I believe the answer is freeze pane view

7 0
3 years ago
Read 2 more answers
What TCP message will be generated for an incoming SYN request for which is there no matching LISTENING port
tresset_1 [31]

Answer:

"Connection Refused"

Explanation:

This is the error message that is returned when the server is not listening on the correct port, or the server is offline.

Cheers.

7 0
3 years ago
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Lera25 [3.4K]

Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

<h3>What is Ransom malware?</h3>

This is known to be a kind of  malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.

Therefore, Ransom  malware that hijacks a user's computer and demands payment in return for giving back access.

Learn more about Ransom  malware from

brainly.com/question/27312662

#SPJ12

6 0
2 years ago
In the beginning of wireless technology, some devices used _____ technology to "beam" information from one source to another sou
sveticcg [70]

Answer:

D. infrared.

Explanation:

Wireless technology for communication uses electromagnetic wave to transmit signals between location. It eliminates the need of cables for connecting network devices.

In previous wireless technology implementation, Infrared rays were used (in tv remotes), which needed to be in the line of sight to its destination. Although it was fast, it has many limitations for a long-haul transmission like its short transmission range, easily blocked by objects and its uni-directional properties.

4 0
3 years ago
The security administrator for Corp wants to provide wireless access for employees as well as guests. Multiple wireless access p
Artemon [7]
It’s B I took the test
7 0
4 years ago
Other questions:
  • What are a few benefits of virtualization?<br> How do they benefit ?
    9·1 answer
  • What formatting option is easiest to read when printed out
    12·1 answer
  • Write the percentage 5 1/4 as a decimal​
    8·1 answer
  • The chip that controls the radio frequency waves within a device
    9·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • What part of the code is a signal for the function to execute and pass back a value?
    11·2 answers
  • When you make a DNS query, where does your computer first check to find an IP address to name mapping?
    8·1 answer
  • You can minimize the Ribbon with a command contained on the _____.
    7·1 answer
  • What is the answer 11100+01010​
    8·1 answer
  • Assume you have a button control named btndisplaylist. Which is the default name for an event procedure that will be executed wh
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!