What are some of the ways that a computer or business can be infected with a computer virus?

Answers

Answer 1

Answer: A way a computer or business can be infected with a virus is via a USB. A person can come into the business with a copy of a C.V. which is destroyed in some way. You give the USB to the receptionist and ask to print you a new one. When they do, a virus hidden in the USB will begin to attack the computer. Another way to infect a computer with a virus is to upload it in a comment box. If a website has a comment/complaint section, a hacker can put in code to a virus. This virus will enact itself once the user opens the website. A fake anti-virus program will appear, and the virus will begin installing itself.

Answer 2

A USB can be used to spread a virus to a computer or organization. Someone could enter the company with a duplicate of a CV that has been damaged in some way. You hand the receptionist the USB and ask them to print you a new one.

What is a computer virus?

A computer virus is a piece of malicious software that spreads by copying itself to a document, the boot sector of a computer, or another program. It modifies how a computer operates in the process. A virus starts to spread among computer systems after some type of human interaction.

When they do, a computer will start to be attacked by a virus that was hidden in the USB. Uploading a virus in a comment box is another technique to get it onto a computer.

Thus, A USB can be used to spread a virus to a computer or organization.

For more information about computer virus, click here:

https://brainly.com/question/14467762

#SPJ2


Related Questions

What is data and what are some of the kinds of data that are increasingly being stored online? What is a "data breache
for governments, organizations, and individuals? THIS IS MY LAST QUESTION I WILL MARK U BRAINLIEST OR PAY U IDC PLEASE JUST HELP

Answers

Answer:

data is just information about something

Data breaches may change the course of your life. Businesses, governments, and individuals can experience huge complications from having sensitive information exposed.

Explanation:

When the condition of an if statement is false, the computer will return an error message to the user.
A. True
B. False

Answers

The correct answer to your problem is A, True

The portion of the IoT technology infrastructure that focuses on how to transmit data is a. hardware. b. applications.

Answers

Answer:

The correct answer is not among the two options listed above (hardware, and applications). The correct answer is "connectivity"

Explanation:

The answer would have been "hardware" if the portion of the IoT technology infrastructure focuses on sensors that take note of the changes in the environment the technology is used. I would have also been "applications" once it focuses on controlling what and how information is captured.

The IoT (Internet of Things) uses sensors, computer applications, and hardware to make devices interact processing and sending large data between computers, collecting data from their surroundings to update the system, and it also uses connectivity to transmit data. This technology is employed in so many fields like health care, Automobile industries, and so more. An example is Self-driving cars which allow devices to be connected to a cloud system.

     

 

how should we utilize our rights​

Answers

Answer:

Human rights also guarantee people the means necessary to satisfy their basic needs, such as food, housing, and education, so they can take full advantage of all opportunities. Finally, by guaranteeing life, liberty, equality, and security, human rights protect people against abuse by those who are more powerful.

Explanation:

Answer:

Speak up for what you care about.  

Volunteer or donate to a global organization.  

Choose fair trade & ethically made gifts.  

Listen to others' stories.  

Stay connected with social movements.

Stand up against discrimination.

Explanation:

If you delete a conversation many times with someone like this, will you stop receiving messages from them, even if you text them

Answers

Yes because they eventually stop caring because u haven’t txt them anymore or vice versa.

Select the correct answer.
Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?
OA.
inspection
OB
internal audit
Ос.
test review
OD
walkthrough

Answers

Answer:

A.  inspection

Explanation:

To find - Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?

A.  inspection

B . internal audit

C.  test review

D . walkthrough

Proof -

SQA process - Software Quality Assurance process

The correct option is - A.  inspection

Reason -

Formal review in software testing is a review that characterized by documented procedures and requirements. Inspection is the most documented and formal review technique.

The formality of the process is related to factors such as the maturity of the software development process, any legal or regulatory requirements, or the need for an audit trail.

The formal review follows the formal process which consists of six main phases – Planning phase, Kick-off phase, the preparation phase, review meeting phase, rework phase, and follow-up phase.

Answer:

answer:    test review

During system testing, developers test the program in an environment that is very similar to how the program will eventually be used.
A. True
B. False

Answers

Answer:

True

Explanation:

When it is time to test a system, a great way to test and confirm the program is safe, and ready is in the most used environment.

The awnser is ( true ).

If you can tell me what Ella Mai's last name is I'll mark you brainliest.

Answers

Ding Dong

I know you can hear me

Open up the door

I only want to play a little

Ding Dong

You can't keep me waiting

It's already too late

For you to try and run away

I see you through the window

Our eyes are locked together

I can sense your horror

Though I'd like to see it closer

Ding Dong

Here I come to find you

Hurry up and run

Let's play a little game and have fun

Ding Dong

Where is it you've gone to?

Do you think you've won?

Our game of hide and seek has just begun

I hear your footsteps

Thumping loudly through the hallways

I can hear your sharp breaths

You're not very good at hiding

Just wait, you can't hide from me

(I'm coming)

Just wait, you can't hide from me

(I'm coming)

Just wait, you can't hide from me

(I'm coming)

Just wait, you can't hide from me

Knock Knock

I am at your door now

I am coming in

No need for me to ask permission

Knock Knock

I'm inside your room, now

Where is it you've hid?

Our game of hide and seek's about to end

I'm coming closer

Looking underneath your bed but

You're not there, I wonder

Could you be inside the closet?

Ding Dong

I have found you

Ding Dong

You were hiding here

Now you're it

Ding Dong

Finally found you, dear

Now you're it

Ding Dong

Looks like I have won

Now you're it

Ding Dong

Pay the consequence

Ding Dong

Looks like I have won

Now you're it

Ding Dong

Pay the consequence

Answer:

her last name is Howell so her full name is Ella Mai Howell lol

Explanation:

Alison wants to create a website with clickable elements, which languages will help her create a website with clickable functionality? scauer hi a {color:#FFF; tex #header .header-button {posit function new user(a) for (var b = ** scele #nav {position:relative; 2-3 #nav ul {margin:0; padding:0; length;C++) { b**** ale) #nav ul li {display:inline; #nav ul li a {display:block ; } return b; "page" #nay ul li:last-child a my Whine:15px 9px;) HTML CSS JavaScript > Sub submit(source as objece, e ls EventArgs) if red. Checked-True then pi. InnerHtml"You prefer red* who was the testy-second president of the 1.$.&.? willia Jefferson liten pl. Inner Html-"You prefer blue end it red.checked-false blue.checked-false End Sub ASP XML XML​

Answers

To make clickable elements she can use JavaScript language

Which of the following is not a common operating system? A) Apple B) Linux C) Unix D) Windows Vista​

Answers

Answer:

A) Apple

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

Apple is not a common operating system.

However, MacOS is an operating system that is designed and developed by an American multinational technology company called Apple Inc.

Most search engines provide specific pages on which you can search for____ and
_____, among other types of content.

1.
A. government reports
B. images
C. software programs

2.
A. news
B. essays
C. computer games

Answers

Answer: c

Explanation: a

Most search engines provide specific pages on which you can search for government reports and news, among other types of content. The correct options are A and A respectively.

What is a search engine?

A search engine is a piece of software that enables users to use keywords or phrases to get the information they're looking for online.

Even with millions of websites available, search engines are able to deliver results swiftly by continuously monitoring the Internet and indexing every page they come across.

A software programme used to do web searches is known as a search engine. They conduct systematic searches of the World Wide Online for specific data that is defined in a text-based web search query.

The majority of search engines offer specific sections where you can do searches for news and reports from the government as well as other kinds of content.

Thus, A and A are the correct options respectively.

For more details regarding search engine, visit:

https://brainly.com/question/11132516

#SPJ2

Need the answer ASAP!!! I’ll mark brainliest if correct

Select the correct answer.
Project team member Kevin needs to define the use of change bars to show deleted and modified paragraphs. Under which standards does
this fall?
O A.
interchange standards
OB.
identification standards
O C.
update standards
OD.
process standards
O E.
presentation standards

Answers

Answer:

I think it's c because it's change and with change most the time change comes with updates

Answer:

update standards

Explanation:

Puede existir la tecnologia sin la ciencia y sin las tecnicas,explique si o no y fundamente el porque de su respuesta

Answers

Answer:

No

Explanation:

No, La ciencia organiza toda la informacion que obtenemos despues de hacer experimentos. Esta informacion se puede replicar y probar, ademas nos ayuda ampliar nuestro conocimiento de varios temas. Las tecnicas, son procedimientos y reglas que fueron formados para solucionar problemas y obtener un resultado determinado y efectivo. Sea como sea la ciencia y las tecnicas se necesitas para que exista la tecnologia. Sin la ciencia y las tecnicas se tendria que obtener la informacion para poder entender y crear tecnologia, y para hacer eso tenes que hacer experimentos, procedimientos, y reglas (ciencia y tecnicas.)

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.7 GHz Bandwidth per channel: 20 MHz This network is required to support an ever-increasing number of devices. To ensure there is sufficient capacity, you want to maximize the available network bandwidth. What should you do

Answers

Answer:

double the bandwidth assigned per channel to 40 MHz

Explanation:

The best way of doing this would be to double the bandwidth assigned per channel to 40 MHz. This will make sure that the capacity is more than sufficient. This is simply because the bandwidth of a channel represents how much information can pass through the channel at any given second, the larger the channel, the more information/data that can pass at the same time. Therefore, if 20 MHz is enough for the network, then doubling this bandwidth channel size would be more than sufficient capacity for the network to handle all of the data.

A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in a stack.

Their teacher is looking to see if a specific ID number is included in the stack. Which of the following best describes whether their teacher should use a linear or a binary search?

A. The teacher could use either type of search though the linear search is likely to be faster
B. The teacher could use either type of search though the binary search is likely to be faster
C. Neither type of search will work since the data is numeric
D. Only the linear search will work since the data has not been sorted

Answers

Answer:

D.

Explanation:

Binary searches are required to be first sorted, since they use process of elimination through halving the list every round until the answer is found. Linear searches just start from the beginning and check one by one.

CodeHS Go Down the Slide: Part One Anyone know what it is?

Answers

I don't know what you are talking about.

3.1.14 Wormhole CodeHS

May I have it in a copy and paste, please?

Answers

Answer:

3.1.14 Wormhole CodeHS

Explanation:

3.1.14 Wormhole CodeHS

How to mark someone the Brainliest

Answers

Answer:

Explanation: Once u get more than 1 answer of a question. A message is shown above each answer that is "Mark as brainiest". Click on the option to mark it the best answer.

Answer:

above

Explanation:

Select the correct answer.
Mike needs to write the primary objectives of a project in a project plan. In which section should he write them?
A.
scope
B.
overview
c.
baselines
D.
schedule

Answers

Answer:

overviews

Explanation:

Which scenarios could be caused by software bugs? Check all that apply.
A. A person catches the flu and misses two days of work.
B. Smartphone users around the world are unable to get phone service.
C. A person is wrongfully arrested by the police.
D. A person receives a $10 bill at an ATM after requesting a $100 withdrawal.

Answers

Answer:

B- smartphone users around the world are unable to get phone service

C- A person is wrongfully arrested by the police

D- A person receives a $10 bill at an ATM after requesting a $100 withdrawal.

Explanation:

Software bugs are the fault and error in the application that affects the result. It can cause an error in receiving a different bill at ATM after withdrawing a different amount. Thus, option D is correct.

What is a software bug?

A software bug is a flaw or an error occurred in the applications of the system that generates unexpected results and causes crashing, and invalid outcomes.

Some software bugs include functional errors, missing commands, typos, crashes, calculation errors, etc. These types of errors can affect the ATM services causing errors in receipt generation.

Therefore, option D. a $10 bill is generated at ATM after withdrawing $100 is an example of software bugs.

Learn more about software bugs here:

https://brainly.com/question/4490366

#SPJ2

Which option is the easiest way to configure macros in Access 2016?
O Edit VBA code.
Create VBA code.
O Use the Macro Builder.
O Use the Database Analyzer.

Answers

The easiest way to configure macros in Access 2016 is to use the Macro Builder. The Macro Builder is a graphical interface that allows you to create macros without having to write any code.

Here's how you can use the Macro Builder:

1. Open your Access database and go to the "Create" tab in the ribbon.
2. In the "Macros" section, click on "Macro" to open the Macro Builder.
3. In the Macro Builder window, you will see a list of actions on the left side. These actions represent different tasks that you can perform using macros.

4. To create a macro, you can simply drag and drop actions from the left side into the main area of the Macro Builder.
5. Once you have added an action, you can specify any required parameters by clicking on the action and filling in the necessary information.
6. You can add multiple actions to your macro by repeating steps 4 and 5.
7. To run the macro, you can save it and then assign it to a button or event in your Access database.

Using the Macro Builder is a great option if you're new to programming or if you prefer a visual approach to creating macros. It allows you to easily build and customize macros by selecting actions from a list and setting parameters. This way, you can automate repetitive tasks in your Access database without needing to write any code.

To learn more about macros

https://brainly.com/question/30057195

#SPJ8

How do programmers reproduce a problem?
A. by replicating the conditions under which a previous problem was solved
B. by replicating the conditions under which the problem was experienced
C. by searching for similar problems online
D. by copying error messages from another software program

Answers

Answer:

B

Explanation:

Answer:

It was

B. by replicating the conditions under which the problem was experienced

on edge

#done with school already

Answers

Answer: omg yes same hate it

Explanation:school is boring and we have to do work.

Convert the following numbers to binary numbers: 5 , 6 , 7 , 8 , 9 .​

Answers

Answer:

log 5,6,7,8,9 is the binary number according to the computer

Answer:

Divide by the base 2 to get the digits from the remainders:

For 5

Division by 2    Quotient Remainder(digit)

(5)/2                    2            1

(2)/2                    1              0

(1)/2                            0                  1

= (101)_2

For 6

Division by 2    Quotient Remainder(digit)

(6)/2                    3            0

(3)/2                    1              1

(1)/2                            0                  2

= (110)_2

For 7

Division by 2    Quotient Remainder(digit)

(7)/2                           3                    1

(3)/2                    1              1

(1)/2                            0                  1

= (111)_2

For 8

Division by 2    Quotient Remainder(digit)

(8)/2                    4            0

(4)/2                    2              0

(2)/2                            1                  0

(1)/2                             0                  1

= (1000)_2

For 9

Division by 2    Quotient Remainder(digit)

(9)/2                    4            1

(4)/2                    2              0

(2)/2                           1                  0

(1)/2                            0                  1

= (1001)_2

Explanation:

A farmer is reading a nature guide to learn how to make changes to a pond so that it will attract and support wildlife. The guide gives the suggestions listed below.
Help Your Pond Support Wildlife
1. Reduce soil erosion by keeping livestock away from the banks of the pond
2. Allow plants to grow along the shoreline to provide cover, nests, and food for wildlife
3. Float logs near the edge of the water to provide habitats for salamanders
4. Add large rocks to provide sunning sites for turtles

Which suggestion involves interactions between two groups of living organisms?
A. Suggestion 1

B. Suggestion 2

C. Suggestion 3

D. Suggestion 4

Answers

D is the answer


Hope this helps

According to the scenario, suggestion three involves the interactions between two groups of living organisms. Thus, the correct option for this question is C.

What is the process called when two groups of living organisms interact?

When two groups of living organisms interact with one another, the process is known as species interaction. It states that the population of one species interacts with the population of other species that live in the same locality.  

Suggestion three reveals that the floating logs near the bank of the water bodies significantly provides a habitat for salamander which are amphibians by nature. So, it gives the chance to aquatic organisms like fishes, phytoplankton, etc. to interact with salamanders. This mutually supports the wildlife of a particular region.

Therefore, according to the scenario, suggestion three involves the interactions between two groups of living organisms. Thus, the correct option for this question is C.

To learn more about Species interactions, refer to the link:

https://brainly.com/question/28062759

#SPJ2

how to Calculate the area of a rectangle in python

Answers

Firstly, take input from the user for length and breadth using the input() function.

Now,calculate the area of a rectangle by using the formula Area = l * b.

At last, print the area of a rectangle to see the output.

Select the correct answer.
Which document represents a written record of how the software should perform and the results of its performance?

A. STD

B.SDD

c.SPMP

D.SRS

E. RTM

Answers

Note that from the option given, the document that presents a written record of how the software should perform and the results of its performance is: SRS (Option D)

What is SRS?

An SRS (Software Requirements Specification) is a document that represents a written record of how the software should perform and the results of its performance.

It typically includes a detailed description of the functions and features that the software is expected to provide, as well as any constraints or limitations on its operation.

The SRS is used as a reference for both the development team and the client, and it helps to ensure that everyone involved has a clear understanding of what the software is expected to do. Other common documents that may be used in software development include the STD (Software Test Description), the SDD (Software Design Document), the SPMP (Software Project Management Plan), and the RTM (Requirements Traceability Matrix).

Learn more about SRS:
https://brainly.com/question/24003956
#SPJ1

What are different ways that celebrities try to connect with fans using the Internet and social media?
*No links or files, I will report your answer so it gets taken down

Answers

Answer:

they ask fans questions they talk to fans they do many things with fans trying to connect with them

Please Help!
Computer Sci

Answers

Answer:

A.

Explanation:

Hope this helps :)

Conflict on cross-cultural teams
O is inevitable and should just be ignored until it blows over
O should be handled immediately, so resentments do not grow
O is not likely to happen, since everyone works in basically the same way
cannot really be controlled, since barriers to communication are so high

Answers

Answer:

should be handled immediately, so resentments do not grow

Explanation:

Edge 2021

Other Questions
What compound(s) does pure water contain? Find the volume of this triangular prism:Answers:350in3175in322in3200in3 pls helpppp lol :/ Id really appreciate it !! Can anyone help me out The Sine FunctionIn a basic sine curve, where can the zeros NOT be found?a. middleb. beginningc. maximum pointd. endPlease select the best answer from choices provided Why does the equation 5(3x-4)-6x=3(3x-4) have no solutions?Bureause when you subtract from both sides of the equation and simplify you get 20-20Berise when you add to both sides of the equation and simplify you get = -12Because when you add to both sides of the equation and simplify you get 2020Because when you add-to both sides of the equation and simple you get 20-12 Why was Saudi Arabia a strategic ally in the 1st Persian Gulf war?A)They used chemical weapons against Iraq to help the allies.BTThey pressured traq with economic sanctions to surrender.C)They provided much of the manpower needed to invade Iraq.D)Their geographic location to where the fighting was taking place made iteasy to launch allied strikes. factor each polynomial This year Andrews achieved an ROE of 30.2%. Suppose management takes measures that increase Asset turnover (Sales/Total Assets) next year. Assuming Sales, Profits, and financial leverage remain the same, what effect would you expect this action to have on Andrews's ROE 1. after capital letters; less important idea main topic 2. after Roman numerals; most important idea unabridged 3. complete phrase 4. group of words compound word 5. study of words outline 6. two words forming one word subtopic 7. short form of writing using only the most important words philology Below is a political cartoon about amendments to the U.S. Constitution. How was the 15th Amendment finally enforced by the passage of the 24th Amendment?African Americans were allowed to vote without restrictions.African Americans had to pay a fine to hold public office.African Americans were allowed to vote only in primary elections.African Americans now had to pay to participate in political campaigns. what percentage would this be? Rewrite this equation in slope-intercept form.6x-3y=12 Find the volume of a pyramid with a square base, where the area of the base is 6.8m^2 and the height of the pyramid is 8.6. Round your answer to the nearest tenth of a cubic meter. A certain company stock hasdecreased by $4 per share.If Krista has 17 shares of this stock,write an integer to represent thetotal change in value of her stock. x-y=6, if x=2, then y= -4 2 QuestionsWhy is the geologic time scale used to show Earth's history?What methods did geologists use when they first developed the geologic time scale? Why Woman in colonial America want to write ? Check the two best answers. 0 for a chance to better express themselves 0 to prove their ability 0 As an opportunity to make money 0 because men encourage them to do so -3(8n+10) distributive property 1) A farmer has sheep and cattle in the ratio 8:3. a) How many sheep has the farmer if he has 180 cattle?b) Find the ratio of the number of sheep to the total number of animals. c) Find the ratio of the total number of animals to the number of cattle.2)My fortune of $ 810 000 is to be divided in the ratio 4:3:2. How much does each person receive?Good