1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
12

Does my computer have virus?

Computers and Technology
2 answers:
vivado [14]3 years ago
6 0

Answer:

does your toothpaste have salt?

Colt1911 [192]3 years ago
5 0

Answer:

Check using this

Explanation:

Poor performance, application crashes, and computer freezes can sometimes be the sign of a virus or another type of malware wreaking havoc. However, that’s not always the case: There are many other causes of problems that can slow down your PC.

Likewise, just because your PC is running fine doesn’t mean it doesn’t have malware. The viruses of a decade ago were often pranks that ran wild and used a lot of system resources. Modern malware is more likely to lurk silently and covertly in the background, trying to evade detection so it can capture your credit card numbers and other personal information. In other words, modern-day malware is often created by criminals just to make money, and well-crafted malware won’t cause any noticeable PC problems at all.

Still, sudden poor PC performance may be one sign you have malware. Strange applications on your system may also indicate malware—but, once again, there’s no guarantee malware is involved. Some applications pop up a Command Prompt window when they update, so strange windows flashing onto your screen and quickly disappearing may be a normal part of the legitimate software on your system.

There’s no one-size-fits-all piece of evidence to look for without actually scanning your PC for malware. Sometimes malware causes PC problems, and sometimes it’s well-behaved while sneakily accomplishing its goal in the background. The only way to know for sure whether you have malware is to examine your system for it.

You might be interested in
Which of the following is not true about designing classes? In order for class information to be printed instead of a memory add
Leokris [45]
'<span>All methods should be declared private</span>' is not true for classes. One should be able to change the properties of objects, and to do this safely and in a controlled manner, some public methods are declared. Some private methods can also be declared for more potentially sensitive operations for being called from within the class. 
6 0
3 years ago
Name two primary goals of quality assurance and control programs:
bulgar [2K]

Answer:

The two main goals are to reach CMM level 5, and when the company can be termed as optimized.

The second goal is to minimize the bugs at the current level as well. And this is important, as improvement is one thing, and ensuring you are correct at the current time is another, and which is essential for survival. And you can think of improvement only if you survive.

Explanation:

The dream of all companies is to become Optimized. And they always try to reach CMM level 5, such that they can serve their clients in the best possible manner. And it is the quality assurance team that keeps an eye on the working of the company and keeps on giving their feedback so that the team can provide better service to the clients in the future, and probably reach the CMMI level 5.

The control program makes the operating system better through the development of an environment in which one can run various other programs. And it, in general, formulates the graphical interface and leverage you to run various programs at one time in various windows. And the control programs are also being known as the operating environment.

5 0
3 years ago
Explain why the cost of ownership may be lower with a cloud database than with a traditional, company database.
geniusboy [140]

Answer:

Cloud database eliminates the need for establishing and maintaining data centres.

Explanation:

Cloud computing provides an organisation with the infrastructure they need but can not afford. A large online storage with access control policies is available based to subscription.

For a company to establish a data centre, they would need a team of skilled network engineers, fleet of high speed server systems and large storage devices.

The daily power supply and management, coupled with the needed skills and items, can be overwhelming for a company whose main objective is not to deliver database services. So cloud computing is adopted to reduce the cost.

4 0
4 years ago
Which type of virtualization do storage area networks typically use?
cupoosta [38]

They use the SCSI protocol for communication between servers.

haha im a computer geek.Good luck!

4 0
3 years ago
Read 2 more answers
What are the risks of logging into a system routing as “root” or some other administrative identity?
Elena L [17]
"Root" in Linus is the the same as Administrator in Windows.
When you log into a system with identity "root" this means that you have administrative privileges (you are not simple user of the system and application). The risk is that as a "Root" you have the authority to make changes in the system and maybe harm the system if you don't know exactly what you are doing.
5 0
4 years ago
Other questions:
  • The part of the inside of a computer
    14·1 answer
  • Deterime the minimum number of multiplication operations needed to compute the following. Show the order of the computations.
    10·1 answer
  • How to find something in the cloud?
    8·1 answer
  • Write an if/else statement that compares the variable age with 65, adds 1 to the variable seniorCitizens if age is greater than
    14·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • What is the primary reason that companies use third party tracking cookies?
    12·1 answer
  • You have just replaced the motherboard in your computer. now your computer will not start. you press the power button on the sys
    6·1 answer
  • A professional photographer working for a top newspaper would like control over the quality and editing
    14·2 answers
  • What is bit in computer science? (You must select all correct answers.) Hb. A. A part of a tool, such as a router. Non. B. A bas
    6·2 answers
  • Which network protocol is used to handle the reliable delivery of information?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!