answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmasim [6.3K]
2 years ago
13

Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and lapto

ps. An optional addition. Already included by the manufacturer on all computers. Generally considered essential for personally-owned devices only.
Computers and Technology
1 answer:
k0ka [10]2 years ago
7 0

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

  • Digital signature
  • Heuristic detection
  • Behavior detection
  • Sandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

You might be interested in
An employee sets up an automation that transfers files in a specific folder on their PC to a remote drive for archiving, provide
Yuri [45]

Answer:

Rule based automation

Explanation:

8 0
1 year ago
2. Sanjay thinks it's okay to plagiarize because he thinks his instructors won't find out. However, it's
Tatiana [17]
The correct answer is B
8 0
2 years ago
Write a script to check command arguments (3 arguments maximum). Display the argument one by one. If there is no argument provid
serious [3.7K]

Answer:-args (

if:args=true

-cont

if:args=false

-cont investigating

if:args=irrelevance

-loop restate args

)

compile exec

Explanation:

7 0
2 years ago
By specifying a(n) ____ specifically for handheld devices, you can customize the page layout such as by designing the content to
antoniya [11.8K]

Answer:

Style sheet.

Explanation:

A website is a collection of web pages. Web development tools are mainly HTML,CSS and JavaScript. They have their individual functions in structuring a web page.

JavaScript is a purpose object oriented programming language widely used in web page for writing scripts, aimed to make web pages interactive.

HTML is a mark-up language which provides a non-linear structuring approach to web page development.

CSS or cascaded style sheet is a tool used to design the element and layout of web pages on a device screen.

7 0
2 years ago
Which DFS option can be used to help manage peak bändwidth needs by forcing replication to occur during off hours?
andrey2020 [161]

Answer: D. Scheduling

Explanation:

Distributed file system (DFS) replication scheduling are used most especially when large files need to be replicated across lower bandwidth connections. It helps manage peak bandwidth by forcing replication to occur during off hours

5 0
2 years ago
Other questions:
  • Suppose the algorithms used to implement the operations at layer k is changed. how does this impact services at layers k-1 and k
    10·1 answer
  • You buy a $3,500 car and finance it through the car dealer. the contract says if you are two months delinquent with your payment
    9·1 answer
  • Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
    15·1 answer
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • What company built its first computer from a wooden box
    12·2 answers
  • Write a static method, getBigWords, that gets a single String parameter and returns an array whose elements are the words in the
    15·1 answer
  • The major result of treating 1-butyne with 6M aqueous NaOH would be:_______.A. the production of an alkene.B. the production of
    10·1 answer
  • The term that refers to the programmer reading the program from the beginning and stepping through each statement is _________.
    5·1 answer
  • Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out t
    9·1 answer
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!