answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin
4 days ago
7

Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c

omputer is running very slowly. She realizes that the hospital system might be infected with malware, so she contacts the IT department. After this is resolved, she resolves to gain a better understanding of the forms of computer software designed to damage or disrupt a computer system, because a damaged system is incapable of providing the support required to manage healthcare information.
Required:
a. When Cindy researches this topic, what will she find in the difference between the two techniques used to create a malware attack?
b. Regardless of the form the malware assumes, what are some of the basic precautions Cindy or someone else at her institution should take to protect the computer system?
Computers and Technology
1 answer:
Amiraneli [962]4 days ago
4 0

Explanation:

Keep in mind that Malware is derived from the terms Malicious-Software (Mal...ware). Therefore, Malware can be understood as software that is deliberately created by cybercriminals to infiltrate or damage a computer or network.

a.

Cindy might discover the distinction between these two methods used for executing a malware attack:

  • via downloads from harmful websites: An attacker may create a harmful website where unsuspecting visitors might click to download various files, which will end up installing malware software onto their systems.
  • through phishing emails: These emails may have attachments that, if they are opened or downloaded by an unaware user, will result in malware infecting their system.

b. Here are several basic precautions;

  • Avoid opening attachments from unfamiliar email addresses.
  • install a reputable paid antivirus program.
  • be cautious of websites overloaded with advertisements.
You might be interested in
In Python, what kind of error is returned by the following code? (e.g. NameError, ValueError, IOError, etc.) def my_func(n1, n2)
Harlamova29_29 [950]

Answer:

SyntaxError.

Explanation:

https://www.quora.com/In-Python-what-kind-of-error-is-returned-by-the-following-code-e-g-NameError-ValueError-IOError-etc-def-my_func-n1-n2-return-n1-n2-my_func-1-2-3          original source

brainlest plz

6 0
1 month ago
Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
amid [867]

Answer:

The type of session hijacking attack that Sean is illustrating is Blind Hijacking, option C.

Explanation:

This is because he is inserting harmful data or commands into the compromised communications within the TCP session, regardless of the source-routing being turned off. He is capable of sending the data or commands, but does not have the ability to view the responses.

3 0
11 days ago
Use Excel to develop a regression model for the Consumer Food Database (using the "Excel Databases.xls" file on Blackboard) to p
oksian1 [849]
Step 1: Use the provided formula to create an Indicator Variable for cities with metro areas. Step 2: Apply a filter to isolate data specific to metro cities, selecting only those marked with Metro Indicator 1. Step 3: Transfer the filtered data to a new worksheet. Step 4: Navigate to Data - Data Analysis - Regression. Step 5: Input the specified Y-variable and X-variable ranges as indicated. Choose the output range and ensure residuals are checked, which will produce the Output Summary and the Predicted Values alongside Residuals. Please see the accompanying attachment.
5 0
10 days ago
Doug grew up on a large farm in southwest Wisconsin. As a college graduation gift, Doug’s father gave him several hundred acres
zubka84 [1007]
Answer: Sole Proprietorship. This question seeks to identify the business type mentioned in the scenario. In a Sole Proprietorship, the owner effectively is the business, managing all elements from operations to finance. Typically, this is the initial business form in entrepreneurship. The description fits Doug well; he operates the farming business independently, taking care of all its functions. Thus, it qualifies as a sole proprietorship.
5 0
9 days ago
A user calls the help desk and reports that the workstation, when powering up, displays error messages about an invalid system d
ivann1987 [982]

Answer:

Option (A) is the correct choice.

Explanation:

The situation describes an invalid boot disk error occurring during startup, indicating that the system fails to recognize the hard disk necessary for booting.

MBR / GPT is the partition layout that holds the essential code for system startup. Occasionally, the partition files that contain this code may become corrupt, causing an invalid boot disk error during the boot process.

Therefore, the most fitting answer is option (A).

The remaining choices are incorrect for these reasons:

  • If the boot system malfunctions, it cannot produce an invalid boot disk error.
  • If the files of the operating system are corrupted, the error will pertain to missing files.
  • A device driver cannot influence the system's booting process.
5 0
1 month ago
Other questions:
  • Accenture is helping a large retailer transform their online sales and services. The Data Analyst audits the client’s customer j
    12·1 answer
  • Assume that the following variables have been properly declared and initialized.
    12·1 answer
  • 3.14 LAB: Input and formatted output: Caffeine levels A half-life is the amount of time it takes for a substance or entity to fa
    9·1 answer
  • Write a program that allows the user to navigate the lines of text in a file. The program should prompt the user for a filename
    6·2 answers
  • Write a program that creates a login name for a user, given the user's first name, last name, and a four-digit integer as input.
    6·1 answer
  • 3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
    9·1 answer
  • Consider the following skeletal C program: void fun1(void); /* prototype */ void fun2(void); /* prototype */ void fun3(void); /*
    11·1 answer
  • Assign max_sum with the greater of num_a and num_b, PLUS the greater of num_y and num_z. Use just one statement. Hint: Call find
    5·1 answer
  • What term best describes the grammatical rules for writing proper code? paths syntax hyperlinks declarations
    7·2 answers
  • When long labels are required, which of these commands can you use to improve readability of a worksheet?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!