1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
8

Identify ways to safeguard computer against each of the following risk viruses, worms, Trojan horses, botnets, denial of service

attacks, back doors and spoofing​
Computers and Technology
1 answer:
STatiana [176]3 years ago
5 0

Answer:

First, never download software or videos from untrusted websites, as they can hide malicious code inside it. Never turn off the anti virus, anti virus only purpose is to block malware or viruses if you disabled it and don't know what you are doing high chance there will be a back door created in your PC. Try a antivirus that is well known and has good reputation on protecting a PC, note that good looking GUI on an antivirus doesn't tell it is always good, it's not the GUI you care about its the whole protecting your PC.

You might be interested in
You want to use a wireless keyboard and mouse with your laptop computer. which method should you use
Viefleur [7K]
If someone wants to use a wireless keyboard and mouse with a laptop computer, below are the steps.

First check if there’s a USB receiver attached to the mouse or keyboard. If there is, see below steps.

1. Connect the USB receiver of both mouse and keyboard into the USB port of your laptop computer. Some USB dongle would ask you to install or add it your device, just click OK and then add.
2. Make sure that the batteries on your wireless keyboard and mouse are working. And also check if the keyboard and mouse are turned on or have power.
3. Check if there’s a “connected” indication for both wireless mouse and keyboard on your laptop. You can now use your wireless mouse and keyboard on your laptop.

If there’s no USB receiver, and you’re using a bluetooth wireless mouse and keyboard, below are some steps to follow.

1. Turn on bluetooth connection on your laptop.
2. Make sure that batteries are working and turn on both wireless mouse and keyboard.
3. On your laptop, find your wireless mouse and keyboard under bluetooth option and connect the devices. You can now use your wireless bluetooth mouse and keyboard for laptop.
4 0
3 years ago
A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What
Afina-wow [57]

Answer:

the temperature of the sample must change

Explanation:

7 0
3 years ago
Which of the following is not an algorithm?
Kipish [7]

Answer:

The correct answer is: "D. shapoo instructions (lather, rinse, repeat)".

Explanation:

Among the options given, letter D is the only one which does not apply and  may not function as an algorithm. An algorithm is a set of rules and/or instructions which aims at solving a problem and/or task, therefore, "shapoo instructions" do not classify as an algorithm because they are only written informations to explain how to use a product (lather, rinse, repeat), rather than setting a procedure for solving a problem in terms of technology tools. All the other options are examples of algorithms because they already exist as such and also function as technology tools.

(ps: mark as brainliest, please?!)

7 0
3 years ago
Which of the following is an example of phishing attack? csp
TEA [102]
There are no examples you imbecile it’s A
4 0
3 years ago
You can put a small level on your camera to help keep the horizons straight? TRUE OR FALSE
anastassius [24]
The answer is true and i believe it is best to put it at the 4 intersecting points<span />
5 0
3 years ago
Read 2 more answers
Other questions:
  • Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data
    11·1 answer
  • The following program includes fictional sets of the top 10 male and female baby names for the current year. Write a program tha
    15·1 answer
  • What software is typically used for larger systems?
    11·1 answer
  • What are the advantages of businesses using Twitter ?
    12·1 answer
  • ) A popular PivotChart that is used in Access is (Points : 4) column.
    9·1 answer
  • Which of these is NOT a desktop computer operating system?
    8·2 answers
  • Write Tic tac toe program in python for beginners pls
    10·1 answer
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
  • Which of the following are acceptable to share? Check all of the boxes that apply.
    13·1 answer
  • The microprogram counter (MPC) contains the address of the next microcode statement for the Mic1 emulator to execute. The MPC va
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!