1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
12

Does my computer have virus?

Computers and Technology
2 answers:
vivado [14]3 years ago
6 0

Answer:

does your toothpaste have salt?

Colt1911 [192]3 years ago
5 0

Answer:

Check using this

Explanation:

Poor performance, application crashes, and computer freezes can sometimes be the sign of a virus or another type of malware wreaking havoc. However, that’s not always the case: There are many other causes of problems that can slow down your PC.

Likewise, just because your PC is running fine doesn’t mean it doesn’t have malware. The viruses of a decade ago were often pranks that ran wild and used a lot of system resources. Modern malware is more likely to lurk silently and covertly in the background, trying to evade detection so it can capture your credit card numbers and other personal information. In other words, modern-day malware is often created by criminals just to make money, and well-crafted malware won’t cause any noticeable PC problems at all.

Still, sudden poor PC performance may be one sign you have malware. Strange applications on your system may also indicate malware—but, once again, there’s no guarantee malware is involved. Some applications pop up a Command Prompt window when they update, so strange windows flashing onto your screen and quickly disappearing may be a normal part of the legitimate software on your system.

There’s no one-size-fits-all piece of evidence to look for without actually scanning your PC for malware. Sometimes malware causes PC problems, and sometimes it’s well-behaved while sneakily accomplishing its goal in the background. The only way to know for sure whether you have malware is to examine your system for it.

You might be interested in
In mathematics, the factorial of a positive integer n, denoted as n! , is the product of all positive integers less than or equa
MrRa [10]

Answer:

public static int factorial(int n) {

   

    if (n >= 1 && n <=12) {

           if (n==1)

               return 1;

           else

               return n * factorial(n-1);

    }

    else

        return -1;

}

Explanation:

Create a method called factorial that takes one parameter, n

Check if n is n is between 1 and 12. If it is between 1 and 12:

Check if it is 1. If it is 1, return 1. Otherwise, return n * function itself with parameter n-1.

If n is not between 1 and 12, return -1, indicating that the number is not in the required range.

For example:

n = 3  Is n==1, NO factorial(3) = n*factorial(2)

n = 2  Is n==1, NO factorial(2) = n*factorial(1)

n = 1  Is n==1, YES factorial(1) = 1.

Then factorial(2) = 2*1 = 2, factorial(3) = 3*2 = 6

6 0
4 years ago
Read 2 more answers
Why are computer messages encapsulated?
Tcecarenko [31]

Answer:

I think the answer is to translate messages from one machine’s programming language into another

Explanation:

6 0
3 years ago
The method needed to arrange for an object to be notified when a window's close-window button has been clicked is
Readme [11.4K]
The correct answer that would best complete the given statement above would be the term addWindowListener. <span>The method needed to arrange for an object to be notified when a window's close-window button has been clicked is addWindowListener. Hope this is the answer that you are looking for. </span>
7 0
4 years ago
The valid call to the function installApplication is
Zanzabum

Answer:

B. installApplication(‘A’, 1);

Explanation:

Given

The above code segment

Required

The correct call to installApplication

The function installApplication is declared as void, meaning that it is not expected to return anything.

Also, it receives a character and an integer argument.

So, the call to this function must include a character and an integer argument, in that order.

Option D is incorrect because both arguments are integer

Option C is incorrect because it passes no argument to the function.

Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).

Option B is correct

8 0
3 years ago
Identify the primary responsibilities associated with each of the following web design roles: content writer/editor, artist/grap
frosja888 [35]

A web designer/developer is responsible for the design, layout and coding of a website. They are involved with the technical and graphical aspects of a website and how the site works and how it looks.

Explanation:

  • A content writer/editor creates and revises the text that visitors read when the visit a website, choose a link, image, video, or other media that enhances your text content.
  • A web artists/graphic designer's responsibility is to create original art, such as logos, stylized typefaces, and avatars, and props for virtual 3-d worlds.
  • A web designer's role is to create webpages that combine, text, images, and links using tools such as markup languages; CCS, HTML, and WYSIWYG editors.
  • Web programmer/database developer's job is to script languages such as, JavaScript, ASP, PHP, and MYSQL and must plan, create, secure, and maintain databases of varying complexity.
  • Web Administrator assumes all roles, including creative, high-tech, and oversight. May oversee a web development team that includes technical and creative roles.
5 0
4 years ago
Other questions:
  • _____ documentation is designed to help programmers and systems analysts understand the application software and maintain it aft
    12·1 answer
  • What is the value of variable num after the following code segment is executed?
    5·1 answer
  • Implement a metho d to nd the k-th largest element in an array of size N using a minimum priority queue (MinPQ). Assume that the
    8·1 answer
  • Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept
    5·1 answer
  • Encrypting text allows us to encrypt and decrypt the text using a special key.
    9·1 answer
  • I really need help in this!!!
    11·1 answer
  • Which of the following is a productivity strategy for collaboration?
    9·1 answer
  • What is the difference between a computer’s RAM and its hard disk?
    13·2 answers
  • A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company n
    11·1 answer
  • Are programs that understand physics and/or hardware embedded? for example, one that uses finite-element methods to predict flui
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!