Answers

Answer 1

Answer:

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. It has the ability to lock a computer screen or encrypt important, predetermined files with a password.

Explanation:

:)


Related Questions

How did imperialism lead to WWI? A The debate of the morality of imperialism created tensions around Europe b Native people were conquered and rebelled against Europe c Europe went into an economic depression when imperialism failed d European nations competed and made alliances to control colonies

Answers

Answer:

d. European nations competed and made alliances to control colonies.

Explanation:

The world War I was a period of battle between various countries from 1914 to 1918. It started formally on the 28th of July, 1914 and ended on the 11th of November, 1918.

Imperialism can be defined as a policy, ideology, or advocacy that sought to extend a country's power, dominion, authority and influence over another country through diplomacy, use of military force or colonization (direct territorial acquisition).

This ultimately implies that, imperialism is an advocacy or policy that is typically used to impose or extend a country's power, dominion, authority and influence. It simply means to seek colonies of other nations or countries.

Hence, imperialism led to WW1 because European nations competed and made alliances to control colonies.

In conclusion, there was an eagerness on the part of European Nations to gain colonial territories that were owned by other rival nations.

Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.

Answers

Answer:

1. Hyperlink

2. IP address

3. Fault tolerance

4. Server

5. To do list

Explanation:

Text within a document that is linked to other information available to the reader is called HYPERLINK.

A unique location for a computer on the network is its IP ADDRESS.

The FAULT TOLERANCE is the ability of a network to cover after any type of failure.

The computer that responds to requests from the client computer is known as the SERVER.

A TO-DO LIST is an ordered list of tasks waiting to be performed.

Answer:

hypertext

IP address

fault tolerance

server

queue

Explanation:

just did it on edg

Every single device can be connected to every other device on network, making the network mesh. This statement is True or False? *
1 point
True
False​

Answers

Answer:

true

Explanation:

we can connect to any device which has a network connection

pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users and businesses?

Answers

Physical security is important because a physical attack is perhaps the most fundamental kind of attack. ... Using a floppy drive or CD-ROM drive on a machine that does not support good BIOS security. Damage to or theft of important machine components, especially those that store data. Theft of an entire machine

1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.

The following scenario is an example of?​

Answers

Answer:

Industrial espionage

Explanation:

Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market

It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant

Industrial espionage is also known as economic espionage

what are the uses of plotters​

Answers

Answer:

Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materials

Hope it helps :)❤

Answer:

 Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....

when should a computer definitely have an ip address

Answers

What do you mean they all come with ip once you buy it
There are two types of IP addresses. PUBLIC IP is assigned by the ISP and PRIVATE IP address provided by your Router. When you are connected to network you definitely should have an IP address.

Timmy walks into a store to buy a PC game. He reads this information about a game on its packaging:

System Requirements
Minimum Recommended
Processor Intel Core i3 or equivalent Intel Core 2 Quad or higher
Memory 2 GB 4 GB or higher
Video Card Integrated Discrete


Based on this information, which statement is true?
A.
Timmy can play the game even if his computer’s specifications don’t meet the minimum requirements.
B.
Timmy can play the game even if his computer has less than 2 GB memory.
C.
Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.
D.
Timmy can play the game even if his computer’s processor class is lower than an Intel Core i3.
E.
Timmy can play the game at a higher level of visual detail if his computer has an Intel Core 2 Quad processor.

Answers

Answer:

C. Timmy can play the game at a higher level of visual detail if his computer has an integrated video card.

Explanation:

The processor efficiency and memory requirements are much more necessary to get the game to run and give it a playable framerate. Having a video card will improve his graphics, so this is more of a suggestion than a necessity.

Select the effective subject lines.


Timecard Machine Relocated

This Message Contains Some Important New Information About Company Operations

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed

Test Results Attached

New Expense Reporting Procedures

Servers

IT Department Closed for Server Maintenance

Answers

Answer:

dont click the link

Explanation:

Answer:

Please Use the New Form in the Revised Employee Manual for Filling Out Your Expense Reports, the Procedure Has Changed  

Servers

 

This Message Contains Some Important New Information About Company Operations

Explanation:

i did this on edge 2021 there is a quizlet with most of the questions

What should a user do to find and replace text throughout a field? Use the drop-down menus to complete the steps
1. Put the cursor in the field to search
2. In the Home tab, open the dialog box
3. On the
tab, enter the text to search for and the replacement text
4. After a few instances to make sure the text is being replaced correctly, you can then click
to
change all instances

Answers

The thing that a user should do to find and replace text throughout a field  are:

1. Put the cursor in the field to search.

2. Open the  find  dialog box.

3. On the Replace tab, enter the text to search for and the replacement text.

4. Click  Replace All  to change all instances.

How do you search for and replace text across an entire field?

The keys on the keyboard CTRL+F is often used  to find. The dialog window for Find and Replace appears. Click the Find tab in the Find and Replace dialog box to search for data. Click the Replace tab to perform a find-and-replace operation.

The operations are:

1. Click Find and Select in the Editing group on the Home tab, then select Replace from the drop-down list.

2. In the dialog box, select the objects you want to Find and Replace by clicking the Options button.

3. Press the Replace or Replace All button.

Therefore, If you want to replace all occurrences of a word or format in a document, use the Ctrl+H Find and Replace function. This is very useful for lengthy papers.

Learn more about Editing  from

https://brainly.com/question/15768529
#SPJ1

See full question below

What are the steps to replace one piece of text with another throughout a field? Use the drop-down menus to

complete the statements.

1. Put the cursor in the field to search.

2. Open the _____

dialog box.

3. On the Replace tab, enter the text to search for and the replacement text.

4. Click -------to change all instances.

--concept mapping--
importance of trees for people:
1.
2.
3.
4.
5.
importance of trees for animals
1.
2.
3.
4.
5.​

Answers

Answer:

-Both need oxygen from the trees to breathe

-Without trees the population of animals and people would be dying

Explanation:

Thats all I can think of

I need help I have questions I need answers in coding html,css,js and python.Fast
The purpose of the sleep method is to reduce the amount of energy the program uses.
True
False
The _____ is a collection of webpages that use the internet.
pseudocode
World Wide Web
Python
server
Which of the following lines of code would correctly create a list called weapons?
weapons == [“sword”, “sling”, “knife”]
weapons = [“sword” or “sling” or “knife”]
weapons = (“sword”, “sling”, “knife”)
weapons = [“sword”, “sling”, “knife”]
Which of these lines of code would import both the random and the time modules?
import random, time
import random and time
time.import, random.import
import(random, time)
When using HTML, your text should be placed between the opening and the closing tags.
True
False

Answers

Answer:

1. True

2. World Wide Web

3. weapons = [“sword”, “sling”, “knife”]

4. import random, time

5. True.

Explanation:

For number 1  I'm not quite sure since I never personally used it, but it does reduce CPU usage when activated so it's very possible it's true.

Why do we use if statements?



To tell Tracy to stop our code if there’s an error


To have Tracy make decisions based on conditional statements


To tell Tracy to do something if we run our code


To have Tracy complete one function at a time

Answers

answer is 2 i’m pretty sure

what is the best free website to learn phyton programming

Answers

That is something you should may research on with yourself! Don’t accept a link
From strangers it’s preferred to find one that best suits you!

Please help! No one is answering these correctly!
A gateway is a common network hardware component that does what?
enables a network to connect to other networks
verifies user credentials to grant network access
connects many devices to a network using a single port
allows specific kinds of data into different parts of a network
What is the best way to prevent the most common cause of network failure?
Avoid using USB cables for connecting devices.
Maintain careful records of networked devices.
Use up-to-date antiviral software to protect computers.
Upgrade routers and servers annually.

Answers

Answer:

it is either c or d

I'm 99.5% sure it is C tho

PLEASE HELPPPPPPP What should you always disconnect before installing hardware inside a computer’s case?

A.
all cabling
B.
all internal components
C.
the CPU
D.
the internal DVD drive

Answers

Answer:

a) all cabling hope it helps

Join for a pack battle loud microphone.

Answers

you look like the battle passss

Help Please! Computer science question !!!!!!!!!!20 points!!!

Answers

Answer:

45 abc

Explanation:

Other Questions
Please help! Directions are in the orange box in the image! Will thank and give brainliest to the correct answer! Will report people fishing for points! Can someone pleaseeee help and if youre correct ill give brainliest Range includes all but what What was the outcome of the North African campaign? MatchingEnter the letter of the box whose contents best match the description.888abefv a mixture of moleculesatoms of a pure elementa metalmolecules of an elementva solid compounda mixture of elementsa. box ab. box ec. box bd. box fe. box df. box cQUESTION 10 Solutions, _____ colloids, _____ light.a) like, will not scatterb) unlike, will not scatterc) like, will scatterd) unlike, will scatter What do we learn about Lieutenant Kotler's father? What did theconversation at dinner have to do with the way with how Lieutenant Kotlertreated Pavel when he spilled the wine?please hurry Help on this question please Help please thxs marking brainlest Why was withdrawing from world affairs a turning point in Chinese history? What is the best estimate of the perimeter of the figure below if each square has a side length of 1 foot? On a coordinate plane, a figure is 30 units around. 26 feet 28 feet 30 feet 39 feet The diameter of a circle is 34 feet. What is the circles area?Use 3.14 as pi How did the Nazi government start to take action against German Jews? Without a meal plan, you are more likely to turn to expensive and less healthy take out meals.TrueFalse HURRY PLEASEE I NEED THIS NOWW What region of Brazil would you expect to be the most industrialized? Why? Why our moods gets changed when we hear MUSIC??? A) Jerry wants to open a bank account with his money. He will deposit $60.75per month. If m represents the number of months, write an algebraic expression torepresent the total amount of money he will deposit Several items in a store are on sale. Complete the table with the correct prices.Original PricePercent of DiscountSale Price$60 20% __?$140 65% __? __? 40% $54.60 __? 10% $10.80 In an isolated system, mass can neither becreated or destroyed.ubeFALSETRUE Gases TestChemistry