Answers

Answer 1

Answer:

Random advertisements that pop up on your computer. Unusual slowness of your system. Unusual instability in your system, computer crashes more than usual

Explanation:

People are trying to hack into your computer


Related Questions

C. What is windows operating system? Compare different versions of operating system after 2003

Answers

Answer:

:)

Explanation:

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows OS from 1985 to present day.

The Windows operating system (Windows OS) for desktop PCs is more formally called Microsoft Windows and is actually a family of operating systems for personal computers. Windows has traditionally dominated the personal computer world, running, by some estimates, more than 75 percent of all personal computers. Beginning in the early 2000s, Windows dominance has lessened with the growth of the Linux and Mac operating systems.

Windows provides a graphical user interface (GUI), virtual memory management, multitasking, and support for many peripheral devices. In addition to Windows operating systems for personal computers, Microsoft also offers operating systems for servers and mobile devices.

Windows is also the foundation for the Microsoft Office productivity suite. Introduced in 1990 as a Windows-only family of applications for desktop computers, Office has grown to become the world’s most widely used productivity suite, with windowscentral.com reporting an estimated 1.2 billion + user worldwide as of 2016.

Which command helps verify the cisco ios ips configuration?

Answers

Router# show IP IPS configuration is a command which can be used to verify the Cisco IOS IPS configuration.

What is a command?

A command can be defined as the set of instructions that is used to configure a network device such as a router, so as to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In this scenario, Router# show IP IPS configuration is a command which can be used to verify the Cisco IOS IPS configuration.

Read more on commands here: brainly.com/question/17147683

#SPJ12

A web search engine is a that helps you locate on the web.

Answers

A web search engine is a software which helps you locate on the web.

A web search engine is a software that searches the web  for information is known as a web search engine. A user query's search results are frequently presented as a list. Web pages, pictures, and other file kinds could be included in the lists.

some major search engines are  Yahoo , Bing etc

Learn more about search engine here:

https://brainly.com/question/20850124

#SPJ10

7.7% complete Question An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable

Answers

The solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

What is data?

It should be noted that data simply means the representation of facts ans concepts on a formalized manner.

In this case, the solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

Learn more about data on:

brainly.com/question/4219149

#SPJ12

The _____ constraint assigns a value to an attribute when a new row is added to a table

Answers

The default constraint gives a value to an attribute when a new row is added to a table.

Is default a kind of constraint?

This is known to be a type of constraint that often apply a value to a column if an INSERT statement does not really give the value for the column.

Therefore, one can say that the default constraint gives a value to an attribute when a new row is added to a table.

Learn more about default constraint from

https://brainly.com/question/19130806

#SPJ12

which is a guideline for conducting technical reviews?

Answers

A guideline for conducting technical reviews is to be sure team members have identical skillsets.

What is Technical review?

Technical review is a term that connote the application of scientific, engineering, or other form of expertise to know if activity for which a permit is requested attain the standards for giving the permit under the required statute and rule.

Therefore, A guideline for conducting technical reviews is to be sure team members have identical skillsets.

See options below

Which is a guideline for conducting technical reviews?

be sure team members have identical skillsets

involve people from different backgrounds

omit domain experts on the review team

Learn more about guideline from

https://brainly.com/question/17711902

#SPJ11

Suppose that you want to write a program that inputs customer data including name, zipCode, balance, and regionNum. At the end of the program, a summary of the number of customers in each of 12 sales regions who owe more than $1000 each is displayed. The most likely statement during the main processing loop would be _________.

Answers

The most likely statement during the main processing loop would be

customerCount[regionNum] =

customerCount[regionNum] + 1

What is a processing loop?

A loop means a sequence of instruction s that is continually repeated until a certain condition is reached.

In this case, the most likely statement during the main processing loop would be customerCount[regionNum] = and customerCount[regionNum] + 1.

Learn more about loop on:

https://brainly.com/question/4510147

#SPJ12

Match the careers with the career clusters.

Answers

The careers with the career clusters are:

A. Architecture and construction:

CarpenterGeologist

B. manufacturing:

Sewing machine operatorQuality assurance inspector

C. Agriculture, food and natural resources:

Animal trainerFarm labor and contractor

D. Energy

Wind turbine engineerElectrician  

What is a career cluster?

Career Clusters are known to be made up of different occupations that belongs to the same field of work that often needs the same skills.

Therefore, the matchup above are correct.

See full question below

Match the careers with the career clusters. (two answers in each group)

CAREERS

1. electrician

2. wind turbine engineer

3. sewing machine operator

4. geologist

5. quality assurance inspector

6. farm labor contractor

7. animal trainer

8. carpenter

GROUPS

A. architecture and construction

B. manufacturing

C. agriculture, food and natural resources

D. energy

Learn more about career from

https://brainly.com/question/11952179

#SPJ1

hexadecimal to denary gcse method

Answers

There are two ways to convert from hexadecimal to denary gcse method. They are:

Conversion from hex to denary via binary.The use of base 16 place-value columns.

How is the conversion done?

In Conversion from hex to denary via binary:

One has to Separate the hex digits to be able to know or find its equivalent in binary, and then the person will then put them back together.

Example - Find out the denary value of hex value 2D.

It will be:

2 = 0010

D = 1101

Put them them together and then you will have:

00101101

Which is known to be:

0 *128 + 0 * 64 + 1 *32 + 0 * 16 + 1 *8 + 1 *4 + 0 *2 + 1 *1

= 45 in denary form.

Learn more about hexadecimal from

https://brainly.com/question/11109762

#SPJ1

Which of the following is NOT a career in the Information Support and Services pathway?

a
Website engineers
b
Technical writers and editors
c
Database administrators
d
Software developers

Answers

Answer:

here yuuuurrrrr Vote for me nah jk

Which is a major drawback of muliuser procesing of a database

Answers

The main drawback of multiuser processing of a database is:

Lost-update problem.

What is  lost-update problem?

In the area of lost update problem, an update that has been carried on to a data item by a transaction is said to be lost as it is known to be overwritten by the update that has been carried on by another transaction.

Therefore, The main drawback of multiuser processing of a database is:

Lost-update problem.

Learn more about database from

https://brainly.com/question/26096799

#SPJ12

When a cookie is created during a website visit, it is stored:

Answers

When a cookie is created during a website visit, it is stored on the hard drive if the visitor's computer.

What is a cookie?

A cookie simply means the small blocks of data that are created by a web server.

In this case, when a cookie is created during a website visit, it is stored on the hard drive if the visitor's computer.

Learn more about cookie on:

brainly.com/question/1308950

#SPJ12

Write a statement that toggles the value of onoffswitch. That is, if onoffswitch is false, its value is changed to true; if onoffswitch is true, its value is changed to false.

Answers

Answer:

import java.io.*;

public class OnOffSwitch

{

public static void main(String[] args)

{

boolean onoffswitch = false;

String value = "false";

if (onoffswitch)

 {

   value = "true";

   onoffswitch = true;

 }

else

{

  value = "false";

   onoffswitch = false;

}

//

System.out.println(value);

}

}

Explanation:

Basically, the simple java program looks through the boolean state and checks, if the boolean value is true, then change the value, otherwise retain the value as default.

The straightforward Java application scans the boolean state and determines whether the value should be changed if it is true, or left alone if it is false.

To toggle the value of the onoffswitch variable, you can use a simple assignment statement along with the logical negation operator (!).

Here's the statement:

onoffswitch = !onoffswitch;

In this statement, the value of onoffswitch is negated using the ! operator. If onoffswitch is currently false, applying the logical negation will change it to true.

On the other hand, if onoffswitch is currently true, the negation will change it to false.

This way, the value of onoffswitch is toggled between true and false based on its current state.

By assigning the negated value back to onoffswitch, you effectively update its value to the toggled state.

Learn more about Coding click;

https://brainly.com/question/17204194

#SPJ6

when scrum team members meet and collaborate with each other to find the best way to build and deliver the software to the customer, which of the following agile values is being practiced?

Answers

The agile values is being practiced is Individuals and interactions over processes and tools.

What is individuals and interactions over processes and tools?

This is known to be a first value that is seen in the Agile Manifesto as it is “Individuals and interactions over processes and tools.”

Note that it place Value of people more highly instead of processes or tools and as such, The agile values is being practiced is Individuals and interactions over processes and tools.

Learn more about  scrum team  from

https://brainly.com/question/4763588

#SPJ11

What type of relational methods that allow you to insert or update records and extract information from records for viewing? comptia

Answers

Data Manipulation Language (DML) allows a user to insert or update records and extract information from records for viewing.

What is a relational database?

A relational database is a type of database designed and developed to store, structure and recognize relation which exist between data points and items of information.

In database management system (DBMS), a type of relational methods which allows an end user to insert or update records and extract information from records for viewing is known as Data Manipulation Language (DML).

Read more on database here: brainly.com/question/13179611

#SPJ12

what is the size of the rc.conf file in bytes

Answers

Answer:

It is 281 bytes.

In the case above, the size of the rc.conf file in bytes is said to be 281 bytes.

What is rc conf file?

The rc. conf file is known to be a file that often specifies the kind of services that needs to  be enabled in course of system startup by the startup scripts that was invoked by /etc/rc (see rc(8)), and that also ashutdown scripts that is said to be invoked by /etc/rc. shutdown.

Note that In the case above, the size of the rc.conf file in bytes is said to be 281 bytes.

Learn more about bytes from

https://brainly.com/question/6835146

#SPJ11

If you use a cluster that is managed by a cloud provider, which of these will be managed for you by the cloud provider? *

Answers

When you use a cluster that is managed by a cloud provider, the things that will be managed for you by the cloud provider are:

Monitoring.Networking.Security management task.

What is cloud?

It should be noted that cloud computing are the software that are made available to users through the internet.

When you use a cluster that is managed by a cloud provider, the things that will be managed for you by the cloud provider are monitoring, networking, and security management task.

Learn more about cloud on:

brainly.com/question/9759640

#SPJ12

#SPJ12

Convert (765)octal into hexadecimal​

Answers

Answer:

1F5

Explanation:

First convert octal 765 into binary values with each octal digit as a representation using 3 bits

Octal 7 ==> 111

Octal 6 ==> 110

Octal 5 ==> 101

Putting it together we get
111110101

Now group the bit values into groups of 4 (with leading zeros if necessary) starting with the rightmost bit.

Groups are highlighted and then the hex value is written

Right-most group 111110101  and 0101 is 5 hex
Middle group: 111110101  and 1111 is F hex

Left most group: 111110101 ; with leading zeros it is 0001 which is 1 hex

So from left to right we get 1F5

Viruses that load from usb drives left connected to computers when computers are turned on are known as.

Answers

Answer:

Viruses that load from USB drives left connected to computers when computers are turned on are known as boot sector viruses

Explanation:

Software designed to close logical ports in your computer is know as firewall Which is NOT a tool hackers use to gain access to and take control of your computer

Data erasure software uses standards that are called.

Answers

Data erasure software uses standards that are called Typically, a software program device is used for information erasure like BitRaser, which implements the overwriting sample primarily based totally on the usual used, together with US DoD 5220.22, NIST 800-88.

What is statistics erasure?

For virtual garage devices, erasing names after its developer, the Gutmann set of rules is a way of disk wiping that overwrites statistics the usage of a complete of 35 passes. This makes it one of the maximum steady statistics erasure methods, however additionally the maximum time-consuming.

The statistics manner that zeros and ones are verifiably overwritten onto all sectors of the device. This renders all statistics completely unrecoverable at the same time as retaining the capability of the device the beyond few years, NIST Special Publication 800-88 has end up the go-to statistics erasure preferred withinside the United States.

Read more about the software :

https://brainly.com/question/1538272

#SPJ1

Sara is asked to create a controller for light sensors. When the light falls on the sensor, it needs to indicate when a particular object is moved from its original position. For this, she needs a credit card-sized motherboard with a microcontroller on it. Which option should she select?

Answers

Answer:

Arduino

Explanation:

Arduino is a free and open-source electronics platform with simple hardware and software. Arduino boards can read inputs, turn on a sensor and transform it into an output, activate a motor, and turn on an LED. Sara may direct her board by sending a series of instructions to the board's microcontroller. To accomplish so, she used the Arduino programming language and the Arduino Software (IDE), both of which are founded on Processing.

You are given a string s, in which one letter occurs twice. every other letter occurs at most once. write a function which given a string s returns a single character string the letter that occurs twice

Answers

The program is an illustration of strings.

Strings are variables that are used to hold texts

The main program

The program written in Python, where comments are used to explain each action is as follows:

#This gets the input

s = input()

#This iterates through the text

for i in range(ord('A'), ord('Z') + 1):

   #This converts each character to lower case

   ch rA = c hr(i) . lo wer()

   #This determines the character with two occurrences

   if s.count(chrA) == 2:

       #This prints the character

       print(chrA)

Read more about strings at:

https://brainly.com/question/15683939

#SPJ1

what type of e-mail typically lures users to sites or asks for sensitive information?

Answers

The  type of e-mail typically lures users to sites or asks for sensitive information is phishing.

What is a phishing email?

Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.

This criminals usually send an email link mimicking the company .

The aim of the email is to get sensitive information in order to access your funds or private information.

learn more on phishing email here: https://brainly.com/question/14954901

#SPJ11

to protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. will this adequately protect the user data on the system?

Answers

This can't adequately protect the user data on the system as one needs to enable file history.

How to depict the information?

In order to protect a windows 10 system, one will need to configure the system restore to automatically protect your system using restore points.

Despite this, this can't adequately protect the user data on the system as one needs to enable file history.

Learn more about windows on:

brainly.com/question/25243683

#SPJ12

The online promotional method that involves applying specific Web design and development techniques to Web pages to increase the possibility that the pages will appear near the top of a search results list is called ____.

Answers

Answer:

Search Engine Optimization (SEO)

Explanation:

SEO, or search engine optimization, is a critical online marketing approach that entails getting your website and business accessible in search engines. Ultimately, SEO is a catch-all phrase for any approach used to boost your website's ranking in search results for keywords related to your business.

Identifying what consumers look for online, the phrases or terminology they use, and the sorts of material they want to consume are key components of any search engine optimization plan. When done effectively, SEO helps marketers to reach and engage with individuals who are looking for the products and services that their company provides.

Which API gives higher performance and low graphics?
OpenGL?
Vulkan?
Direct3D11?
Metal?
pls suggest your answer

Answers

I believe Vulkan Ubisoft uses it for there large scale game for them to work on computer that can’t handle them

What is the principle of operation of the INS?

Answers

The principle of operation of the INS is referred to as dead reckoning.

What is INS?

INS is acronym for Inertial Navigation System and it can be defined as a navigation device that is designed and developed to make use of motion sensors, a computer, and rotation sensors, so as to continuously calculate by dead reckoning the velocity, position, and orientation of an object in motion.

Based on Engineering and Aircraft Avionics, we can infer and logically deduce that the principle of operation of the Inertial Navigation System (INS) is referred to as dead reckoning.

Read more on INS here: https://brainly.com/question/26052911

#SPJ12

30 POINTS FOR THE CORRECT ANSWER
Now that you have a solid understanding of the history, principles, elements, typography, and colors used in graphic and web design, what do you think is the most critical part of creating a design that gets the right response from your target audience? Your answer must include your thoughts on what part is most important, why it is most important, and an explanation of how you would go about creating a design based on your choice. Your answer must mention and be supported with information from each of the lessons in the unit.

Answers

Answer:

Whether it’s on our phones, in books or on websites, we’re constantly digesting written words. From instruction booklets to shop fronts, type is all around us. We often reflect on the power of the written word, but rarely do we consider the designer’s role in emulating the tone of the word or sentence.

Behind the scenes, a designer has taken the time to consider the relationship between the look of the text and what the text says. In reality, different moods, atmospheres and emotions can be expressed simply through the type choice. But what actually is typography—and why is it so vital?

In this article, we’ll lift the lid on everything you need to know about typography. We’ll start with the definition of typography, including a brief history of its origins. We’ll then address the benefits of good typography and the impact it can have on your users. Finally, we’ll look into the different elements that comprise typography, and what they all mean.

Here’s what we’ll cover:

What is typography?

Why is typography important?

The different elements of typography

How to choose the correct typeface for your website

Conclusion

an estimated _____ percent of all college students suffer from ptsd.

Answers

An estimated amount of nine (9) percent of all college students suffers from PTSD.

What is the meaning of Post Traumatic Stress Disorder (PTSD)?

Post-traumatic stress disorder (PTSD) is a mental health disorder caused by experiencing a traumatic incident.

It can emerge after experiencing or witnessing a traumatic incident from symptoms includes from such as:

Flashbacks from accidents or war,Nightmares,Acute anxiety, as well as Uncontrolled thoughts from abuse.

According to statistics, it is estimated that nine (9) percent of all college students suffer from PTSD.

Learn more about Post Traumatic Stress Disorder here:

https://brainly.com/question/13097232

#SPJ12

ram is ________ and has no moving parts.

Answers

RAM is Electronic (solid state) and has no moving parts.

What is a RAM in computer?

RAM is known to be an random-access memory as it is said to be a short term memory and it is the place where data is saved as the time the processor requires for it.

Note that RAM is Electronic (solid state) and has no moving parts as it is often inbuilt in a computer system.

Learn more about RAM From

https://brainly.com/question/13196228

#SPJ11

Other Questions
curved surface area of a cone = Trl, where r is theradius and is the slant height.The cone below has a radius of 3 cm and a slant heightof 7 cm.Work out the total surface area of the cone.Give your answer in terms of .7 cm3 cm Which benefit results from being in a healthy romantic relationship? Denise is designing the seating arrangement for a concert at an outdoor theater. To give everyone a good view, each row must have 6 more seats than the row before it, and the 1st row can only have 11 seats. Explain to Denise how to create an equation to predict the number of seats in any row. Then, using your equation, show your work to determine the number of seats in row 18. what is the value of k such that 5x-2y=9 and 6x+ky=4 are perpendicular? Solve the inequality and express your answer in interval notation. Cells are for tissues as organs are to What was the position the USA took about the holocaust and why did they take it Can anyone help me??? Question 12 (5 points) Which of the following are reasons medical records are used?Question 12 options:a) Settle legal disputesb) Monitor performance and quality in medical institutionsc) Diagnose and treat medical problemsd) Support employment decisions 12 identically sized pieces of timber are x cm long when put together. How long is each individual piece? find the average rate of change Peter uses the equation y = StartFraction 13 over 4 EndFraction x to model the number of miles that he has walked in x hours. Which statement is true about the proportional relationship that is modeled by Peters equation? OOOZora Neale Hurston's writing focused on:rural African American folklore and speech patterns.her own experiences working in New York's factories.the rhythms of Blues and Jazz music.None of these choices are correct. The type of stretching in which a person performs a movement and holds it for a set amount of time is called Question 29 of 40Find f(-2) for f(x) = 5.3*. evaluate the following expression when x=-4 and y=4x-x /4y[tex]\frac{x}{y}[/tex] What is the difference between normal definition of set and contors definition of set find value o x 235 degree arc In this excerpt from "Ulysses" by Alfred, Lord Tennyson, which of the following is a recurring concept?I am a part of all that I have met;Yet all experience is an arch wherethro'Gleams that untravell'd world whose margin fadesFor ever and forever when I move.How dull it is to pause, to make an end,To rust unburnish'd, not to shine in use!As tho' to breathe were life! Life piled on lifeWere all too little, and of one to meLittle remains: but every hour is savedFrom that eternal silence, something more,A bringer of new things; and vile it wereFor some three suns to store and hoard myself,And this gray spirit yearning in desireTo follow knowledge like a sinking star,Beyond the utmost bound of human thought. convert the proof to the paragraph format