1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
7

after confirming the removal of a virus from a computer, how should the technician ensure and verify the full functionality of t

he system
Computers and Technology
1 answer:
Mariana [72]3 years ago
5 0

After confirming the removal of a virus from a computer, the next step is to check for the latest OS patches and updates.

Gathering information from the user and other sources is the first step involved in troubleshooting process.

After resolving a computer problem, the next step is to verify full functionality by ensuring that the OS is up to date and by testing the operation of the computer and the network that it is connected to.

The last step is documenting the issue and solution

Find our more on virus at: brainly.com/question/17395741

You might be interested in
You are manually configuring a tcp/ip host. another administrator gives you the router's ip address. what is the tcp/ip term for
Nuetrik [128]
Answer: Default Gateway address
5 0
4 years ago
Read 2 more answers
If a storm is 7.5 kilometers away, how much time is expected between observations of lightning and thunder? Round your answer to
Svetlanka [38]

Answer:

22.5 s is the correct answer to the given question .

Explanation:

Given that

d=7.5km=7.5\times 10^3 m

For light:

We know that speed of light c

c=3\times 10^8 m/s

We know that

Distance = Speed \times timed=C\time tt=\dfrac{D}{t}t=\dfrac{7.5\times 10^3}{3\times 10^8}\ st=2.5\times 10^{-5}st=0.025 ms

For thunder :

Speed of sound ,v=332 m/s

Time\  taken\  by\  sound \\t\’=\dfrac{7500}{332}=22.59 s

Therefore the difference between time is given as follows

\Delta t= t' - \ t=22.59-2.5\times 10^{-5}=22.59 s

22.5 is the answer

4 0
3 years ago
Software engineering design teams use ________, which are grounded in mathematical concepts of sets and relations, for their sof
zloy xaker [14]

Answer:

Relational Databases

Explanation:

These are digital databases that are made to recognize relations between previously stored items of info.

4 0
3 years ago
The ........ tag is used to create a link to another document​
Free_Kalibri [48]

Answer:

The "a" tag or <a></a> and its "h<u>r</u>ef" attribute <a href="#"></a>

Explanation:

In html there is only one way to create a link to an external source or a bookmark. The tag is created using the element <a>.

The attribute "href" is then added to describe the link of where it is to point to.

Example:

<a href="google.com">Go to Google</a>

While the text in between the tag describes what the link is about.

7 0
3 years ago
What do I do if someone wants to be my friend, and I don’t know who the person is online?
prohojiy [21]
Tell someone you're close to, and see what advice they have. It's best to ignore the person until then.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Respond to the following in a paragraph of no less than 125 words. What is the purpose of netiquette guidelines?
    10·1 answer
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • How do you change between worksheets inside an excel workbook?
    13·2 answers
  • The posterior auditory stream terminates in the ________ and is involved in ________.
    12·1 answer
  • Please conduct some research and find an article on Security Threats and please provide link of the article.
    5·1 answer
  • How many cells does the organism have?\
    5·2 answers
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • Five technology tools and their uses​
    5·1 answer
  • Why might a company choose Linux for its operating system instead of Microsoft Windows or Mac OS? The company's employees can sy
    13·1 answer
  • Why do designers of smartphones hide computer processing details from
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!