1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
3 years ago
8

Identify ways to safeguard computer against each of the following risk viruses, worms, Trojan horses, botnets, denial of service

attacks, back doors and spoofing​
Computers and Technology
1 answer:
STatiana [176]3 years ago
5 0

Answer:

First, never download software or videos from untrusted websites, as they can hide malicious code inside it. Never turn off the anti virus, anti virus only purpose is to block malware or viruses if you disabled it and don't know what you are doing high chance there will be a back door created in your PC. Try a antivirus that is well known and has good reputation on protecting a PC, note that good looking GUI on an antivirus doesn't tell it is always good, it's not the GUI you care about its the whole protecting your PC.

You might be interested in
What is one similarity between compiled and interpreted programming languages? (5 points)
Rashid [163]

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, <u>the similarity between both languages is that they are high level languages and translate code for a computer to understand. </u>

8 0
3 years ago
Put your snap in the comments below if you want to be friends
jok3333 [9.3K]

Answer:

I don't have S nap, but my ensta is  brandnewmillennium

Explanation:

4 0
3 years ago
Read 2 more answers
. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by or
irinina [24]

Answer: SETA program

Explanation:

 The SETA program is basically stand for the security, education, training and awareness. It is basically used to reduce the accidental security which is break by the organization member such as employees, vendors and contractors.

The SETA program provided various benefits to the organization as it improve the behavior of the employees.It basically enhance the training and education program by focus and concentrate on the information security.

It can also inform he member of the organization about the report of violating many policies.

7 0
3 years ago
Need some help writing a simple PYTHON Student registration program:
Y_Kistochka [10]

import random

database = {}

while True:

   try:

       user_choice = int(input("Enter your student id to bring up your information (Press enter if you don't have one) : "))

       if user_choice in database:

           print("Student ID:",database[user_choice][0],"\nFirst name:",database[user_choice][1],"\nLast name:",database[user_choice][2],"\nPhone number:",database[user_choice][3],"\nEmail address:",database[user_choice][4],"\nPassword:",database[user_choice][5],"\nPoints:",database[user_choice][6])

   except ValueError:

       name = input("Enter your first name: ")

       last_name = input("Enter your last name: ")

       phone_number = input("Enter your phone number: ")

       email = input("Enter your email address: ")

       password = input("Enter a password: ")

       points = 100

       student_id = random.randint(1,1000)

       while student_id in database:

           student_id = random.randint(1,1000)

       print("Hello,",name,"your student ID is:",student_id)

       database[student_id] = [student_id,name, last_name, phone_number, email, password, points]

I wrote my code in python 3.8. I hope this helps.

6 0
3 years ago
Given a two-dimensional array named scores with double type elements, write the embedded loop to navigate this array and multipl
bearhunter [10]

Answer:

Following are the code to this question:

void increase(double scores[][]) //defining method increase

{

//defining loop to multiply the value by 10

for(int x=0;x<scores.length;x++)

{

for(int y=0;y<scores[x].length;y++)

{

scores[x][y]=scores[x][y] * 10; //multiply value

}

}

}

increase (scores);  //call method and pass the value

Explanation:

Description to this question can be described as follows:

  • In the above-given code, a method increase is declared, in which we pass a double array "scores", and inside the method two for loop is defined.
  • Inside the loop an integer variable "x and y"  is used, which multiply by 10 in the score array.
  • In the next line method is called, that accepts array value, in this method calling we can't need to receive the return value because it increases, and it does require a void return type.
7 0
3 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • I have been trying to work on this for a while now, and this is on excel
    11·1 answer
  • Write a program which:
    10·1 answer
  • What is the difference between a manufacturing engineer and a materials engineer?
    7·2 answers
  • If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
    8·1 answer
  • Maeve has created the website, but she is not able to include more than one blank space at a time. Even if she hits the SPACE bu
    6·1 answer
  • What does 69 mean?<br> Whenever I watch memes they always talk about the number 69
    8·2 answers
  • How to play Drinkopoly game?
    12·1 answer
  • 11 Select the correct answer. Which external element groups items in a design?
    9·1 answer
  • Why would an end-user not generally buy a server? Explain your answer by referring to the typical role that servers perform. ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!