1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
4 years ago
8

Which security risk is an example of malware?

Computers and Technology
2 answers:
Anvisha [2.4K]4 years ago
8 0

Answer:

The correct answer will be Viruses, Worms, Rasonware, Trojans, Botnets and Adware.

Explanation:

Basically Malware is a software or a Malicious software which harms the computer users, intent of damaging computer devices, holding or stealing a data and generally causing a mess,

Often created by the hackers just looking for money. But no matter from where malware comes and how, it always comes with a bad news for the computer devices and for the users.

Some points to protect from Malware :

  • Don't trust strangers online.
  • Get an add blocker.
  • Double check your downloads.
  • Be careful where you browse.

And the best way to remove malware and to stay protects is to use an Antivirus named as Anti-Malware Software. So before it attacks on your PC, Mobile or Mac , you should install this antivirus software.

marshall27 [118]4 years ago
3 0
Viruses, worms, ransomware, spyware and trojan horses. These are some answers 
You might be interested in
A ______ oversees the planning and implementation of sophisticated security measures to block unauthorized access but at the sam
meriva
A-database administrator
8 0
3 years ago
A computer with a single cpu has 4gb ram, with the operating system taking up 512mb and each user program also taking up 256mb.
lutik1710 [3]

Let's assume a condition where ram is 256 MB and the program size is more than 256 MB

in that case, CPU has to wait for I/O to load the remaining part of the program..in this case  

CPU utilization is much poorer.

So adding gives benefit only when your CPU is fast enough to take advantage like if a process waiting for I/O

it can put the current process in the run queue and take another process from the ready queue.

This way a better CPU utilization can be achieved.  

So by adding ram we can load more programs while waiting for I/O . CPU utilisation will be better.

here by adding 2GB ram we can load 2048/256 = 8 new process into ram at the same time.

2. if cpu have to execute the cpu bound process that wait for I/O cpu will be idle most of the time while  

waiting for I/O to be done..this way CPU utilization will be  poorer as compare to earlier.

3 0
3 years ago
You are planning to write a guessing game program where the user will guess an integer between one and 20. Put the commented ste
Rudiy27

Answer:

1. Generate a random number

2. Ask the user for a guess.

3. Compare the user's answer to the correct number.

4. Give the user a hint as to whether their guess is too high or too

Explanation:

Leave a like and brainist if this helped

7 0
3 years ago
Of these two types of programs:a. I/O -bound b. CPU -bound which is more likely to have voluntary context switches, and which is
viktelen [127]

Answer:

For I/O-bound we require voluntary context switches.

For CPU-bound we require non-voluntary context switches.

Explanation:

A voluntary context switches occurs when process has given up control of the CPU because it requires a resource that is currently unavailable(such as blocking for I/O). It happen frequently in normal system operation. Voluntary context switching initiated with a call to the sleep() routine.

A non-voluntary context switches occurs when the CPU has taken away from a process, such as when it's time slice has expired or it has been preempted by a high-priority process. It is forced by direct invocation of the low-level context-switching mechanism embodied in the mi_switch() and setrunnable() routines.

7 0
3 years ago
Emerson needs to tell his browser how to display a web page. Which tool will he use?
alina1380 [7]

Answer:

HTML

Explanation:

HTML stands for <em>"Hypertext Markup Language." </em>It allows the creation of electronic documents which use <em>semantics</em> to indicate a particular text. The different HTML elements are being separated by<em> "angle brackets" </em>in order to make up a tag. These tags are not visible, but they make it possible for the browser's page to be interpreted.

8 0
3 years ago
Read 2 more answers
Other questions:
  • You’ve been hired to help with installing cable at a new office building for the local branch of the Social Security Administrat
    14·1 answer
  • What is the f(n) runtime of the following pseudocode: sum-0 for A = N/2 downto 1 for B-1 t increment sum by B Explain: exactly w
    13·1 answer
  • Which of the following is a good choice to help you stay organized when you are away from the office? A. Personal Information ma
    7·1 answer
  • hey computor guys. is the MSI B250M GAMING PRO LGA 1151 Intel B250 HDMI SATA 6Gb/s USB 3.1 Micro ATX Motherboards - Intel compat
    8·1 answer
  • Using ______, a smartphone can connect to an automobile audio/control system
    6·1 answer
  • Project management software helps you develop a ______________, which serves as a basis for creating Gantt charts, assigning res
    15·1 answer
  • Write a method named hopscotch that accepts an integer parameter for a number of "hops" and prints a hopscotch board of that man
    15·1 answer
  • The Monte Carlo method is commonly used to approximate areas or volumes of shapes. In this problem, we will use Monte Carlo to f
    12·1 answer
  • Designations at the end of file names such as .docx and .html are called
    7·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!