Answer:
Java can run on any OS
need an OS to run
A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which action would you take first?
A. Reinstall the operating system
B. Run an antivirus scan
C. Pay the ransom to recover the data
D. Disconnect the PC from the network
E. Restore files from backup
Answer:
D. Disconnect the PC from the network
Explanation:
I'd say this because it keeps the ransomware from spreading to other computers making it a bigger problem.
In this question, the answer is "Option D", which disconnects the PC from the network, which can be defined as follows:
A customer's PC has been attacked using ransomware after she opened a document file. She has been unable to access any of her files. She first had to detach the PC from the system to access the file.This type of malicious software (malware) threatens to publish or prevent information or computer access until the victim pays a ransom price to the attacker. Today, ransomware assaults are all too frequent. This attacker then demands a ransom from the victim, promising to restore access to the information in exchange for payment.The wrong option can be defined as follows:
In option a, it is wrong because when we reinstalling the OS is used to start the fresh without using the old files.In option b, it is wrong because the antivirus can't protect the ransomware maliciously. In option c, it is wrong because when a corporation can pay the ransom, their cash is dispersed across the dark web.In option e, it is wrong because creating copies of information could be recovered in the event of a primary information failure.Learn more:
Ransomware: brainly.com/question/14455233
PLZZZZ HELP!!!
Select the correct answer.
What does the coding phase involve?
A.
testing and debugging code to remove all possible errors
B.
writing sequences of statements in a suitable programming language to produce the desired program
C.
designing a proper pseudocode using human-readable language
D.
compiling and interpreting programs into machine language
E.
breaking down the entire code into workable modules
Answer:
B.
writing sequences of statements in a suitable programming language to produce the desired program
Explanation:
During the coding phase, developers analyze the feasibility of each coding language and begin programming according to coding specifications. Without proper coding, the product won't function according to the customer's specifications, and new codes may need to be implemented
Which option is the default configuration of the Junk Email Options in Outlook 2016?
No Automatic Filtering
Low
High
Safe Lists Only
Answer:
No Automatic Filtering
Answer:
NO automatic filtering
Explanation:
i took the quiz
they will wash the car change into tag question
Answer:
They will wash the car, won't they?
Explanation:
A tag question usually comes after an independent clause. The tag question is most times attached with the intent of affirming the statement made in the independent clause. Our independent clause in the answer above is; "They will wash the car". The tag question, "Won't they?" is meant to affirm that statement.
Another example is, "They are going to school, aren't they?" In this example also, the independent clause makes a sentence that is to be confirmed by the tag question.
HELPPPPPP How is does technology impact the career of your choice? Write 5-6 sentences about how technology impacts the career of your choice.
Answer:
Explanation:
Summary. Technology has had a dramatic impact on the nature of work itself, individual applicants and employees, employers, and career counselors. It has changed the nature of work and the types of jobs that people do today. It has altered the knowledge and skills individuals need to be effective workers.
What are the two main parts of system unit hardware?
Answer: Computers have two main parts: hardware and software
Like piano (hardware) and music (software)
Explanation:
Need help ASAP??? Pick the best answers
Answer:
A and C are correct pick both
the process of preparing and setting up a software on a computer is called
Answer:
installation
Explanation:
Installation (or setup) of a computer program (including device drivers and plugins), is the act of making the program ready for execution.
to be useful for most household applications, DC voltage is?please
Answer: To be useful for most household applications, DC voltage is passed through a step-down transformer.
Explanation: Voltage coming through AC or DC outlets is typically far too high for most household appliances to handle, so the current is passed through a step-down transformer to reduce the voltage to a usable level.
Can someone plz answer these questions plz
Answer:
ñbyte I'm pretty sure, sorry if u get it wrong you should do more research about the question if i get it wrong!!
⚠️⚠️⚠️⚠️HELP - What is the software that allocates resources of a physical computer to a virtual machine?
Group of answer choices
Switch
Operating systems
Hypervisor
HostVM
Answer:
the answer is going to be hostvm
Describe the importance of human resource for business growth
Answer:
Having come a long way since traditional “personnel,” HR is a critical business function that helps companies succeed in hiring employees, keeping them engaged, and supporting their growth and development. HR Assists Managers and Team Leaders. ... HR Helps Employees Achieve Their Career Goals.
Why is it important to think about the programming language to use?
Answer:
"The choice of programming language determines the type of game you can make."
Explanation:
Programming language enables us to write efficient programs and develop online things based on the certain type of code.
how do you think the blitz might have affected civilian morale in london
Answer:
It would have seriously negatively affected civilian morale in London. Hearing about the horrors of the war even from far away does a number on morale. This, however, was not exactly the case for London in WWII, because even as air raids were executed on the city, the citizens, confined to underground bomb shelters, still managed to pull together and keep morale high, causing London NOT to plunge into chaos, but to stand united against Germany.
A financially stable person is able to:
A. spend money without having to save.
B. use loans to cover his or her living costs.
C. default on loan payments.
D. save money.
Answer:
Save Money
Explanation:
D
An acceptable website design is one that meets
user design expectations and is also:
A.colorful
B.effective
C.template-based
D.standardized
Answer:
i'd say b
Explanation:
NO LINKS
Do you need to pay monthly to stream on Twitch?
Aspire is a test you take to prepare for the
A. PSAT
B. SAT
C. ACT
D. FAFSA
Answer:
ACT
Explanation:
"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing." - https://greentestprep.com/resources/act-prep/act-aspire-test/
Aspire is a test you take to prepare for the ACT. Thus, option C is correct.
What is ACT?"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing.Aspire is a test people take as a preparation for both ACT a d SAT.
Aspire is a valuable tool to help students and their parents monitor progress towards a good ACT exam from 3rd to 10th grade. The Aspire test assesses student performance in five areas covered by the ACT exam: English, math, reading, science and writing. Aspire Test is offered in the spring and fall seasons, the cost of the assessment tool depends on how many subjects you would like to measure and how often you want your student to be tested.
Learn more about Aspire Test on:
https://brainly.com/question/4469429
#SPJ7
The number of P/E cycles that a solid-state drive can support may vary, within what range?
o
1 to 100
1,000 to 100,000
10,000 to 10 million
10 billion to 10 trillion
Answer:
C. 10,000 To 10 Million
Explanation:
Got It Right On Edge
Answer:
the answer is C. 10,000 to 10 million
Explanation:
i took the test on edge
Who is the one you shouldnt have killed from fnaf?
(I already know but whoever answers first and right gets brainlest)
Answer: He was thought to be one of William Aftons victims who is also thought to be the child who possessing golden freddy
Explanation:
Answer:
Cassidy I guess
All of the following are problem-solving steps except:
A. taking action.
B. defining the problem.
c. doing the first solution that comes to mind.
D. creating possible solutions.
Answer:
C. Doing the first solution that comes to mind.
Explanation:
Lets break this down a bit.
A is a great problem solving step, so we can mark that off.
We can do the same for B.
However, for C, I am hesitant about this one, so I wont mark it off quite yet.
Finally, for D, it is definitely a step, so I can mark that off.
You should never do the first solution that comes to mind, since you haven't done enough brainstorming about other ideas.
Hope this helps!
A digital footprint is .
Your digital footprint is the trail of 'electronic breadcrumbs' you leave behind when you use the internet. It can include the websites you visit, the photos you upload and your interactions with other people on social networks.
Answer: is something you must manage
Select the correct answer.
Who takes care of the final layout of the product that meets the standards set by UX designers?
O A web developer
ОВ.
design director
OC. UX designer
OD. UI designer
Reset
Next
Hi
Answer:
UI designer
Explanation:
⚠️⚠️⚠️⚠️⚠️⚠️Help! What is not an advantage of using virtual machines?
You can run multiple operating systems on one physical machine.
It doesn’t take up any storage space on the physical machine.
You can save the entire state of a VM to your files.
Provides fault and security isolation for the computer’s hardware
Answer:
It doesn’t take up any storage space on the physical machine.
Explanation:
The virtual machine does take up some storage space on the physical machine.
PLZZZ HELP
Select the correct answer.
Ed is the manager of a software design team. He needs to call a design review meeting. Who should he call for this meeting?
A.
only the stakeholders and external reviewer
B.
stakeholders and technical team
C.
the technical team and external reviewer
D.
only the technical team
E.
only the external reviewer and stakeholders
Answer:
C: the technical team and external reviewer
Explanation:
Plato/Edmentum
6.20 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input. Ex: If the input is: Institute of Electrical and Electronics Engineers the output should be: IEEE
Answer:
Explanation:
The following code is written in Python. It creates a function that takes in a phrase as an argument. Then it splits the phrase into a list of words. Next, it loops through the list and adds the first letter of each word into the acronym variable if it is a capital letter. Finally, returning the acronym variable. Output can be seen in the attached picture below.
def accronymGenerator(phrase):
phrase_split = phrase.split(' ')
acronym = ""
for x in phrase_split:
if x[0].isupper() == True:
acronym += x[0]
else:
pass
return acronym
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory.Starting with this memory arrangement , follow the sequence of instructions and record the final contents of each of these memory cells: Address Contents 00 AB 01 53 02 D6 03 02 Step 1. Move the contents of the cell whose address is 03 to the cell at address 00. Step 2. Move the value 01 into the cell at address 02. Step 3. Move the value stored at address 01 into the cell at address 03.
Answer:
I DON'T KNOW THE ANSWER SO SORRY
Explanation:
BUT THANKS FOR THE POINTS
You want to change your cell phone plan and call the company to discuss options
Edna needs a safer car to drive. She likes to travel a lot, so she is looking for a small SUV. She is trying to decide between buying a new or used car. After doing some research, she finds out that most cars lose value each year by a process known as depreciation. You may have heard before that a new car loses a large part of its value in the first 2 or 3 years and continues to lose its value, but more gradually, over time. That is because the car does not lose the same amount of value each year, but it loses approximately the same percentage of its value each year. What kind of model would be most useful for calculating the value of a car over time?
Answer: Buy a new car
Explanation: If its a used car its breaks will be worn out and more likely the breaks will stop working in 6 months and you have to change them. May the forse be with you.
Consider four Internet hosts, each with a TCP session. These four TCP sessions share a common bottleneck link - all packet loss on the end-to-end paths for these four sessions occurs at just this one link. The bottleneck link has a transmission rate of R. The round trip time, RTT, for all fours hosts to their destinations are approximately the same. No other sessions are currently using this link. The four sessions have been running for a long time. What is the approximate throughput of each of these four TCP sessions
The correct response is - The TCP protocol creates a three-way connection between hosts on a network to send packets. It is a connection-oriented protocol. It is a protocol found in the OSI network model's transport layer. Given that all lost packets are sent again, it is trustworthy.
What is a TCP protocol?One of the key protocols in the Internet protocol family is the Transmission Control Protocol. It was first used to supplement the Internet Protocol in the first network installation. TCP/IP is the name given to the full suite as a result.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity. It is therefore used to transfer data from higher-level protocols that demand the arrival of all sent data.
The usage of TCP allows for the safe exchange of data between the server and the client. No matter how much data is transferred across the network, it ensures its integrity.
To read more about TCP protocol, refer to - https://brainly.com/question/27975075
#SPJ6