answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
2 years ago
12

Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he

r antivirus program failed. When she checked the update history, she discovered that the program had not been updated for two weeks. She restarted her computer and noticed that a file she was working on was no longer available. She also noticed that the network connection was sending data, even though she does not have an internet browser or any other user initiated network connection open. ​ What should Jannette do first on her computer?
Computers and Technology
2 answers:
algol [13]2 years ago
4 0

Answer:

A. Run anti-malware program.

B. Roll back to a previous date.

C. Quarantine the system.

D. Remediate the infected system.

E. Get a VPN

Explanation:

Marysya12 [62]2 years ago
3 0

Answer: ur never going to get your answer!!!!

ExpElanation: hahahahaha ( pls 5 star pls pls. Shhhh)

You might be interested in
Company A is setting up a network of mostly Windows machines. Which networking file system protocol would you recommend for maxi
maxonik [38]

Answer:

For maximum interoperability, NFSv4 is recommended.

Explanation:

When setting up a network of mostly windows machines, it is better to use NFSv4 because it includes performance improvements, mandates strong security, and a stateful protocol.

4 0
2 years ago
What does this mean user defined text 14409 551?
densk [106]
In a student financial aid. this means that the school received your info from Fasfa but did not complete it yet in order to determine the amount the student will receive. In other words, the financial aid is on pending and they are not yet processing it.
8 0
2 years ago
Sarah Jones is a coder who is working with a team to create a new mobile operating system. At their last meeting, the team discu
GrogVix [38]

<u>Explanation:</u>

Open-source software in simple terms refers to software whose source code can be changed by another developer other than the original developer (the original creator).

Benefits:

  • it allows improvements
  • it is easy to get tutorials about the software from several developers.
  • fewer usage restrictions

A Closed-source software does not allow modification, in other words, it means programmers cannot improve the program expect if given permission by the creators.

To ensure the quality of the program the developer needs to perform periodic internal testing.

5 0
1 year ago
Again, suppose that n and r denote integer values where r &gt; 0 and n ≥ 0. What are two "simple" values, say lowEnough and tooH
enyata [817]

Answer:

Answer explained

Explanation:

From the previous question we know that while searching for n^(1/r) we don't have to look for guesses less than 0 and greater than n. Because for less than 0 it will be an imaginary number and for rth root of a non negative number can never be greater than itself. Hence lowEnough = 0 and tooHigh = n.

we need to find 5th root of 47226. The computation of root is costlier than computing power of a number. Therefore, we will look for a number whose 5th power is 47226. lowEnough = 0 and tooHigh = 47226 + 1. Question that should be asked on each step would be "Is 5th power of number < 47227?" we will stop when we find a number whose 5th power is 47226.

6 0
1 year ago
Although it is not a term Excel uses, how do most people think of Excel?
lbvjy [14]

Answer:

People think of Excel as a Spreadsheet.

7 0
1 year ago
Other questions:
  • The __________ of a desktop computer is the case that houses the computerâs critical parts, such as the processing and storage d
    5·1 answer
  • When creating a table in the relational database design from an entity in the extended e-r model, the attributes of the entity b
    13·1 answer
  • Which key retains its uniqueness even after you remove some of the fields?
    14·1 answer
  • A form that dedicates a page for each item retrieved for a case; it allows investigators to add more detail about exactly what w
    10·1 answer
  • In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
    14·1 answer
  • Chris accidentally steps on another student’s foot in the hallway. He apologizes, but the other student does not want to hear it
    13·2 answers
  • Joe wants to use an engaging image as a hook in his presentation , but he’s afraid of violating any copyright law. What should h
    10·1 answer
  • 4. Why does Hancock believe that our communication online is more honest than we might<br> expect?
    15·2 answers
  • Write a class named Employee that has private data members for an employee's name, ID_number, salary, and email_address. It shou
    7·1 answer
  • A small e-commerce company uses a series of Robotic Process Automation solutions to manage the backup of data from individual wo
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!