1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
2 years ago
8

HELP ME PLEASE

Computers and Technology
1 answer:
MAXImum [283]2 years ago
4 0

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

You might be interested in
Please help can’t get a bad grade!
SOVA2 [1]

Answer:

Algorithms are a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Pseudo code is an informal description of an algorithm or how a program will function.

a. An example of an algorithm using coding terminology would be a function to find the largest or smallest number in a user-defined array.

b. A function that could include an algorithm would be a function that compares input.

c. Pseudo code could be used to outline a part of a program that has to carry out a specific function.

I hope that helped! If you have any questions I am glad to help.

5 0
3 years ago
Which data type would you ascribe to a pointer? (unsigned) real (unsigned) integer boolean No answer text provided.
poizon [28]

Answer:

The Unsigned Integer

Explanation:

Solution

The data type i would ascribe to a pointer is the unsigned integer because it can be a pointer (int*number).

The unsigned Integer: they are like integers that is whole numbers, but have the property that they don't contain a + or - sign related with them. thus they are seen as non-negative (zero or positive).

6 0
3 years ago
Write a program that calls a function to change a variable value from miles to kilometers.
Aneli [31]

Answer:

#include <iostream>

using namespace std;

void miles_to_km(float &miles)//function to convert miles to kilo meters.

{

   miles=miles*1.6;

}

int main() {

   float miles;

   cout<<"Enter the miles"<<endl;

   cin>>miles;//taking input of the miles..

  miles_to_km(miles);//calling function that converts miles to km..

   cout<<"The number of km is "<<miles<<endl;//printing the km.

return 0;

}

Output:-

Enter the miles

54

The number of km is 86.4

Explanation:

I have created  a function miles_to_km of type void which has the argument miles passed by reference.In the function the variable miles is converted to kilo meters.Then in the main function the function is called with the value prompted from the user.Then printing the changed value.

7 0
3 years ago
When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
pav-90 [236]

Answer:

lower-priced models offer more features

Explanation:

4 0
3 years ago
A power supply unit for a computer converts:
mixer [17]
A power supply unit for a computer converts <span>220 Voltage to 110 Voltage.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Every preprocessing directive must begin with:
    11·1 answer
  • You are running out of storage space on one of your servers. you need to purchase an external hard drive, as there are no drive
    8·2 answers
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • A python package used in text analysis and natural language processing. True or False
    10·1 answer
  • &gt;What is the output of the following code:
    5·1 answer
  • Me Completan Pliiiis
    11·1 answer
  • Is it true or false and incomplete doing can be saved in Paint​
    15·1 answer
  • Come up with a system, using only
    8·1 answer
  • Question #4
    7·1 answer
  • A(n) ____ is system software. Group of answer choices word processing program presentation graphics program operating system spr
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!