1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zubka84 [21]
2 years ago
8

HELP ME PLEASE

Computers and Technology
1 answer:
MAXImum [283]2 years ago
4 0

Explanation:

Threats

Computer Security Threats are possible dangers that can affect the smooth functioning of your PC. These may be a small piece of adware or a harmful Trojan malware. In the present age, computer security threats are constantly increasing as the world is going digital. computer security threats

Types of Computer Security Threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Tips for Best Computer Security

For best computer security, you must follow certain guidelines, which are also called computer best practices. 1. Use the best antivirus software, which not only provides protection to your PC but also internet protection and guards against cyber threats. 2. Do not download untrusted email attachments and these may carry harmful malware. 3. Never download software from unreliable sites as they may come with a virus that may infect your system as soon as you install the software.

You might be interested in
Y’all think Super Drags is good?
Kryger [21]

Yeah, I'm into it. It does show a lot of stereotypical views on drag queens, and it goes a little over the top, but honestly? The LGBT community has spent so long acting like the general population, and we're expected to be a sort of cookie cutter outline of the ideal person in order to fit in. We're not really allowed to be silly and have fun, otherwise we just get labeled as a stereotype, which sucks. When you're queer, you get labeled as that before anything else: your interests are seen as a byproduct of your queerness, not as an interest. So Super Drags, is actually a nice sort of change of pace. It's silly, it shows that queer people are human, and it sorta shows that "Yass bih" look on life, which is hilarious imo. Plus hey, Brazilian LGBT show that doesn't spout homophobic propaganda and supports diversity within all aspects of life? I'll support that.

TLDR; There aren't many silly shows out there that have an LGBT cast. Like, it's always supposed to be grim and sad, and all about heartbreak and coming out, yadda yadda yadda. So, it's cool that we've finally got something lighthearted.

3 0
3 years ago
. Consider the problem of finding the largest element in a list of n elements. What will be the basic operation of an algorithm
natali 33 [55]

Answer:

Comparison.

Explanation:

When we have to find a largest in a list of n elements.First we have to iterate over the list so we can access all the elements of the list in one go.Then to find the largest element in the list we have to initialize a variable outside the loop with the minimum value possible and in the loop compare each element with this value,if the element is greater than the variable assign the element to the variable.Then the loop will find the largest element and it will be the variable.

4 0
3 years ago
Apart from confidential information, what other information does NDA help to outline ?
Vikki [24]

There isn't enough info for me to answer this with complete confidence XD.

6 0
3 years ago
List all the connectors or components that can be connected internally to the motherboard
Amiraneli [1.4K]

A computer’s motherboard has a series of slots and connectors. Slots allow daughter boards to be plugged directly while connectors allow communication through cables with other peripheral devices. CPU sockets, Hard Drive connectors, Memory sockets, and Power connector are examples of components that can be connected internally in some way to the motherboard. Other physical devices include RAM, hard disks, and graphics card.

5 0
2 years ago
Read 2 more answers
generally, ( mouse,keyboard,hard disk,pen drive) can't be removed from the computer ? choose the correct answer​
artcher [175]

Answer:

Hard Disk

Explanation:

A very important part of a computer is the hard disk. It stores data and documents that users may have downloaded. Removing the hard disk could make the computer useless.

A mouse, keyboard, or pen drive can be easily removed.

A mouse and a pen drive are USB-connected devices and can be removed by simply unplugging the cable. A keyboard can be removed by simply taking off the keycaps. It is easily accessible.

-Chetan K

7 0
2 years ago
Read 2 more answers
Other questions:
  • How do you run a function in python?
    5·1 answer
  • Write a program that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer values t
    5·1 answer
  • How do you go about inserting additional worksheets into a workbook?
    15·1 answer
  • When light does not pass through or bounce off an object, it is said to be
    13·2 answers
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time
    11·1 answer
  • What are some best practices for file management
    8·1 answer
  • A local pizza shop is selling a large pizza for $9.99. Given the number of pizzas to order as input, output the subtotal for the
    12·1 answer
  • HOW TO GET RID OF THESE LINES?? PLS WILL GIVE BRAINLIEST
    8·2 answers
  • PLS HELP MEE it's due in 2 minutes​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!