1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
3 years ago
7

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

Computers and Technology
1 answer:
Goshia [24]3 years ago
3 0

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

You might be interested in
What do workspaces allow a company to do?
erica [24]

Answer:

The answer to this question is given below in the explanation section. The correct answer is A.

Explanation:

The correct answer to this question is:

They restrict access depending on job role.

because the company creates different workspaces for particular departments. Each department allows access to its employee to work and use the assigned resources. Other people from other departments can't use their computers due to security reasons.

However, the following options are not correct.

They connect a company's website with its internal wiki.

They allow a company to organize information. (information is maintained inside in the workspace)

They provide a platform for collaboration.

8 0
3 years ago
What is the difference between ‘’ and “” string type in python?
Mekhanik [1.2K]

Answer:

There is no difference between ‘’ and “” string type in python. Both are used to hold the string or sequence of character in the python. triple """ """ can also use for the same.

Example:

str1 = "aeiou"

str2 = 'aeiou'

str3 =""" hello"""

print(type(str1), type(str2),type(str3))

<class 'str'> <class 'str'> <class 'str'>

Here all are used to hold string or sequence of character.

6 0
3 years ago
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
What is filter in image processing
Alla [95]

Answer:

Image processing operations implemented with filtering include smoothing, sharpening, and edge enhancement.

4 0
3 years ago
The what toolbar can be customized to the preferences of the user
schepotkina [342]
Is this a multiple choice question?
7 0
3 years ago
Other questions:
  • Isabella's manager has asked her to write up a _____ that describes their company's interest in developing a custom software sol
    13·1 answer
  • Which three of the following are used for mobile Internet access?
    12·2 answers
  • Anti-bullying laws in most states are designed to provide
    14·2 answers
  • How would you describe enterprise computing
    12·1 answer
  • Janice, who is 15, posts post a picture of herself drinking alcohol and making an obscene gesture on her social network page. wh
    15·2 answers
  • Password combined with pin used as an authentication requirement is an example of:
    6·1 answer
  • Refer to the color wheel to identify the color scheme.
    13·1 answer
  • Write an algorithm to solve general formula? ​
    10·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • How should excel Identify social security numbers: as a text, numbers, or date and time? Why?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!