answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
2 years ago
11

A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which ac

tion would you take first?
A. Reinstall the operating system
B. Run an antivirus scan
C. Pay the ransom to recover the data
D. Disconnect the PC from the network
E. Restore files from backup
Computers and Technology
2 answers:
SashulF [63]2 years ago
4 0

Answer:

D. Disconnect the PC from the network

Explanation:

I'd say this because it keeps the ransomware from spreading to other computers making it a bigger problem.

Sveta_85 [38]2 years ago
3 0

In this question, the answer is "Option D", which disconnects the PC from the network, which can be defined as follows:

  • A customer's PC has been attacked using ransomware after she opened a document file. She has been unable to access any of her files. She first had to detach the PC from the system to access the file.
  • This type of malicious software (malware) threatens to publish or prevent information or computer access until the victim pays a ransom price to the attacker.
  • Today, ransomware assaults are all too frequent. This attacker then demands a ransom from the victim, promising to restore access to the information in exchange for payment.

The wrong option can be defined as follows:

  • In option a, it is wrong because when we reinstalling the OS is used to start the fresh without using the old files.
  • In option b, it is wrong because the antivirus can't protect the ransomware maliciously.
  • In option c, it is wrong because when a corporation can pay the ransom, their cash is dispersed across the dark web.
  • In option e, it is wrong because creating copies of information could be recovered in the event of a primary information failure.

Learn more:

Ransomware: brainly.com/question/14455233

You might be interested in
#Imagine you're writing a program to check if a person is
irakobra [83]

Answer:

i hope the program below will help you!

Explanation:

5 0
2 years ago
While rendering the homepage of a website, it takes a lot of time due to the thread being blocked in processing JS/CSS. What are
jekas [21]

Answer:

a) Pick ONE OR MORE options Using code-splitting for JS files.

b) Compressing the JS files on the server-side

Explanation:

Javascript is a multi-purpose programming language, it is used in web development as a scripting language for programming the interactiveness of the web application.

Loading and running the script from the server can take a lot of time, so, the file is compressed and split for faster loading.

6 0
2 years ago
When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo
DochEvi [55]
What are the options?
3 0
2 years ago
Read 2 more answers
"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequen
m_a_m_a [10]

Answer:

#include <iostream>  // includes input output functions

#include <string> // used for string functions

using namespace std;   // identifies objects like cout , cin

int main() {  // body of the main function

int index;   // index position of the elements

simonPattern = "RRGBRYYBGY";   //stores simon pattern

userPattern = "RRGBBRYBGY";   //stores user pattern

int userScore = 0;  // used to store the user score

// loop compares characters of user and simon patterns

for ( index = 0; userPattern[index] == simonPattern[index]; ++index) {

     userScore = userScore +1; // adds to the user score

     if (userPattern[index] != simonPattern[index]){

//if user and simon pattern do not match

        break;      }   } // breaks the loop

cout << "userScore is  " << userScore; // prints the user score

Explanation:

The program compares the user pattern to simon pattern character by character and keeps adding one to the user score if the characters of both simon and user patterns match. The loop breaks if the character of user pattern does not match with that of simon matter. At the end the calculated user score is displayed in the output.

3 0
2 years ago
To adjust the height of cells, position the pointer over one of the dividing lines between cells. When the pointer changes to th
Sergio [31]

Answer:

double arrow shape

Explanation:

To adjust the height of the cells

1. We have to position the mouse pointer over one of the column line or the one of the row line.

2. As we place the pointer between the dividing lines, the cursor of the mouse pointer change from singe bold arrow to double arrow symbol.

3.Now press or click the left mouse button and drag the dividing lines of the   cells to the desired position to have the required width or height of the cell.

5 0
2 years ago
Other questions:
  • Which data type stores images and audio visual clips?
    15·1 answer
  • In the State of Florida, the penalties for DUI become progressively more severe depending upon the number of convictions and the
    6·3 answers
  • What is the other name designated to a game master of multiplayer online games (MMOs)?
    11·2 answers
  • A class of Students was previously defined with the following properties: a string name, an integer age, a Boolean variable indi
    14·1 answer
  • We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
    15·1 answer
  • ___________is used for drawing 3D objects in the field of Science and Engineering.
    12·2 answers
  • Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well as a special value SUM. Y
    12·1 answer
  • In an executing process, the program counter points __________.
    15·1 answer
  • A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which ac
    11·2 answers
  • In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted an
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!