1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
10

Which type of malware prevents you from accessing files stored on your computer?

Computers and Technology
2 answers:
EleoNora [17]3 years ago
7 0

Answer:

Ransomware. Ransomware is a type of malware that can restrict users from accessing a system or data, and even delete or publish data if a ransom is not paid. It can restrict a user from access to files through encryption. There is still no guarantee that paying the desired ransom will restore systems or data. Explanation:

Rashid [163]3 years ago
3 0
Ransomeware is the type of malware that takes your files over or delete files such as system 32
You might be interested in
In the Microsoft publisher application, words underlined in red are ____.
nydimaria [60]

In the Microsoft publisher application (as well as many other websites such as Brainly, Google docs, etc), words underlined in red are spelled incorrectly.

Whether you spelled it incorrectly or did not complete the words, as long as the word is not found in the dictionary, the word would be underlined with a red squiggly line.

~

4 0
3 years ago
Information systems include all of these
Ulleksa [173]

Answer:

D

Explanation:

because you need people to access software through hardware and data through information and procedures.

4 0
3 years ago
How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? what system transl
nordsb [41]
Awesome question! I love networking. When you enter a URL into your browser, your computer sends the request to your ISP or internet service provider. Your ISP has a HUGE database that coordinates the IP address to the domain name. This database is called a DNS, or Domain Name Service. So when you submit www.google.com to your ISP, they return look in the DNS and find the IP address. The ISP then returns the IP address to you. Your browser then takes the IP and connects you to the server. The server finally send the index.html file to and your browser and renders it as a web page. 

This all happens in the blink of an eye. The internet is truly amazing :D
6 0
3 years ago
Write a statement that calls a function named IncreaseItemQty, passing the variable addStock. Assign mugInfo with the value retu
PolarNik [594]

Answer:

Explanation:

#include <stdio.h>

#include <string.h>

typedef struct ProductInfo_struct {

char itemName[30];

int itemQty;

} ProductInfo;

ProductInfo IncreaseItemQty (ProductInfo productToStock, int increaseValue) {

productToStock.itemQty = productToStock.itemQty + increaseValue;

return productToStock;

}

int main(void) {

ProductInfo mugInfo;

int addStock;

addStock = 10;

scanf("%s", mugInfo.itemName);

scanf("%d", &mugInfo.itemQty);

**** /* Your solution goes here */ ****

printf("Name: %s, stock: %d\n", mugInfo.itemName, mugInfo.itemQty);

return 0;

}

8 0
3 years ago
The application window controls include: minimize, maximize, and close<br><br> A) true <br> B) false
Arlecino [84]

Answer:

True

Explanation:

Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.

6 0
3 years ago
Other questions:
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • A computer that stores and distributes newsgroup messages is called a newsreader.
    13·1 answer
  • The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cr
    7·1 answer
  • SIKILDIM OF NAPİM TÜRK OLAN VARMI
    15·1 answer
  • What are 2 main differences betweenarrays andstructs?
    7·1 answer
  • Your program will search for prime numbers. You will first ask the user for the range of values to search, and use for loops to
    6·1 answer
  • What is the danger of open-source software when it comes to military robotics?
    13·1 answer
  • Select three areas that should be included in a contract consultant’s business expense model.
    11·1 answer
  • Need help asap
    5·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!