1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
7

Astrid’s computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which

time she will receive a means to unlock the files. What type of malware has infected her computer?
i. Bitcoin Malware
ii. Crypto-malware
iii. Blocking virus
iv. Networked worm
Computers and Technology
1 answer:
monitta3 years ago
6 0

Answer:

Your answer would likely be ii

Explanation:

Most of the time these types of programs will behave like the one stated. They normally want you to pay with Bitcoin but it can vary like with Ethereum or really anything that's in the stock market! But it normally consists of Bitcoin

You might be interested in
The four general functions of any application program are: data storage, data access logic, application logic and presentation l
miv72 [106K]

Answer:

True is the correct answer to the above question.

Explanation:

  • An application program is used for specific tasks. It is a program with some specified lines of instruction which instruct the computer to process any task.
  • When a user wants to create an application program or project then he can do it with the help of four parts. which are as follows:-
  1. There needs some presentation which can be called as front-end, which is the graphics interface for the user of that program. It facilities the user to drag and drop options for the user of the project.
  2. The second thing is data storage, which is used to store the data of the project.
  3. The third thing is data access logic, which is used to create a logic to extract or add the data to the database.
  4. The fourth thing is application logic which is used to send the data or present the data to the user in front-end design.
  • The above question-statement also wants to states the same which is described above. Hence true is the correct answer to the above question.

5 0
3 years ago
Question very important cause after my school is over at 5 'oclock I will be playing rocket league if anyone wants to play just
jarptica [38.1K]

Answer:

So can u tell me wut is ur question...It is not understandable

6 0
3 years ago
Compare and contrast the various options that exist for acquiring software.
Softa [21]

Answer:

   The various options that exist for acquiring software are:

  •  By developing a various custom applications so that, they can satisfied the requirements in an organization.
  •  By purchasing various software application or packages for modify the software to meet the specific requirements.
  •  Used the open source software for developing the specific information system so that, the system are acquired.
  •  Developed the in-house capabilities and skills of employee, this is the main advantage for acquiring the software.  
6 0
3 years ago
What are 3 key factors in defining cost on cloud storage
gregori [183]

i'm not sure sorry

I hope someone else can help you with this question

3 0
3 years ago
Utility software can help you to
Allushta [10]
Utility software can help you to designed to help analyze,configure , optimize  or maintain a computer.
6 0
3 years ago
Other questions:
  • Hard drive storage is considered to be solid state. true or false
    8·1 answer
  • 7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
    5·1 answer
  • Which kind of system software tells the computer how to communicate with peripherals, such as a prero
    6·2 answers
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    7·2 answers
  • As your textbook explains, Wikipedia is usually the only source you need when
    8·1 answer
  • How would asking questions or defining problems be used in this career?<br> -
    13·1 answer
  • Lyla is writing a program that uses a recursive method. Why might she want to use a recursive helper method?
    8·1 answer
  • Please tell fast plzzzzzz​
    6·1 answer
  • Which memory can be removed from motherboard? RAM OR ROM?​
    7·1 answer
  • CLS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!