Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

Answers

Answer 1

Answer:

ransomware

Explanation:


Related Questions

______________________ can run on a workstation or server and is at the heart of all business applications.

Answers

Answer:

I believe the correct answer is Application Software.

Explanation:

what is the answer i need help asap

Answers

Answer:

A

Explanation:

Transformers are used on power lines to take high voltage and powerful electricity and turn it into safe electricity.

Answer:

Transformer

Explanation:

It makes sense!  A transformer like, changes the power, so if they needed to reduce the power, they use a transformer!

What are at least three common technologies used within this pathway?.

Answers

Multitasking , in a variety of environments, long distance communications

What will the following code print?
My width = 4
height = 12
perimeter = width * 2 + height * 2
print (perimeter)

Answers

perimeter = width * 2 + height * 2

width = 4

height = 12

perimiter = (4*2)+(12*2)

perimiter =8+24

perimiter =32

Since it displays perimiter, it would display 32

n the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal.

Answers

In the bus topology, a hardware device called a terminators are used at each end of the cable to absorb the transmitted signal.

what should you do if an online friend asked to meet you after school?
ᵖˡˢˢˢˢ...​

Answers

Answer:

I'm going to agree if they had some decision when we meet to each other because I want to meet them in personal.

Explanation:

That's my own opinion

Different between data and information

Answers

Answer:

The difference is simple Look in explain part.

Explanation:

Data is the raw facts that needs processing.

Data is the inputed question or equation that the use

gives.

Information is the processed data that has a meaning.

It is the out put of the inputed data that we gave to the q

computer/device .

HOPEFULLY THIS WAS HELPFUL

Which probe is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves

Answers

The probe that  is designed exclusively to monitor the RF for transmissions and can only monitor the airwaves is dedicated probe.

What is dedicated probe?

A dedicated probe is known to be a kind of probe that has the ability  to be or functions as both a probe and also as an access point that can give roaming to wireless users.

Note that a dedicated probe is often used to track the RF frequency that is mainly used for transmission. These probes often act as both an AP and a probe so as to look into the airwaves.

Learn more about probe from

https://brainly.com/question/2092614


what is personal computing ​

Answers

Answer:

Personal computing means utilizing a computer that is located at the same work station where the input or output of data is conducted.

Explanation:

Pls, choose me as brainliest!

Electronic mail can be sent and received through any ___________ account

Answers

Answer:

main

Explanation:

it must be your main account

Will : 2*1*3 get tommyinit off of the screen or no explain your answer

Answers

Answer:

2 to the 1 to the 1 2 3 please get tommyinnit off my screen, yes

Explanation:

his unfinished symphony

Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company

Answers

The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.

What are some ways to handle against email phishing attacks?

People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:

Be on guard towards the  handing of sensitive information. Never click on alarming messages. Do not open any form of attachments that is suspicious or strange.

Learn more about  phishing attacks from

https://brainly.com/question/2537406

What does a virtual machine emulate?

Hardware
Networks
User interfaces
Web sites

Answers

Question

What does a virtual machine emulate?

✒ Answer

Hardware

Write a python code that prompts the user for a floating-point number and prints
the smallest integer that is larger than the number the user entered.

Answers

Answer:

glitched

Explanation:

brainly deleted my answer

When Web site visitors are involved in downloading malicious code without their knowledge, they may be unknowingly involved in what type of process

Answers

Answer:

Drive-by download

Explanation:

The unintentional download of malicious code onto a computer or mobile device that exposes users to different types of threats.

An integer n is divisible by 9 if the sum of its digits is divisible by 9. Develop a program to display each digit, starting with the rightmost digit. Your program should also determine whether or not the number is divisible by 9. Test it on the following numbers:


n = 154368
n = 621594
n = 123456


Hint: Use the % operator to get each digit; then use / to remove that digit. So 154368 % 10 gives 8 and 154368 / 10 gives 15436. The next digit extracted should be 6, then 3 and so on

Answers

The program is an illustration of the modulo operator

What is a modulo operator?

The modulo operator is an operator used to determine if a number is divisible by another

The main program

The program written in Python, where comments are used to explain each action is as follows:

#This defines the function

def divisible(n):

   #This sets a boolean value to false

   divcCheck = True

   #This initializes a counter to 0

   num=0

   #The following iterates and prints the digits of the number

   while n>0:

       a = n%10

       n = n - a

       n = n/10

       print(int(a),end=" ")

       #This checks if the digit is divisible by 9

       if (int(a)%9 != 0):

           divcCheck = False

   num = num + 1

   #This prints true or false, depending if the number is divisible by 9

   print(divcCheck)

Read more about python programs at:

https://brainly.com/question/16397886

Which sentences describe the purpose of a magazine cover?
A magazine cover has to visually appeal customers. Depending on the type of magazine brand, the cover also represents social, political,
economic, medical, ltechnology, and fashion trends. A magazine cover has to appear different from other magazine covers in the newsstand or
store, and help to drive sales of the magazine brand. As a graphic designer designing a magazine cover, you need to know what will print well.

Answers

The  sentence that describe the purpose of a magazine cover is that a magazine cover has to visually appeal customers.

Based on the type of magazine brand, the cover also stands for social, political, economic, medical, technology, and fashion trends.

What is the aim of a magazine cover?

A key functions of the magazine cover is made so that it can sell the issue's inside features(stories).

The  magazine cover  is one that is very vital as it has a lot of short quotes or intriguing lines  that is said to be floating about the cover page.

Learn more about  magazine cover from

https://brainly.com/question/25817628

Answer:

A magazine cover has to visually appeal customers. Depending on the type of magazine brand, the cover also represents social, political, economic, medical, technology, and fashion trends. A magazine cover has to appear different from other magazine covers in the newsstand or store, and help to drive sales of the magazine brand. As a graphic designer designing a magazine cover, you need to know what will print well.

Explanation:

just took the test and did well youre welcome hope this helps

If you need to multiply 50 and 8 and divide by 2, what would you type on the numerlc keypad?
50/8/2
50/8'2
50'8/2
50'8'2

Answers

Answer:

50*8/2

The asterisk is the multiplication sign and the parenthesis is the division.

I've never used an apostrophe for a multiplication sign before, but I'm guessing multiplication is what it stands for.

Explanation:

Which of the following is a feature of a utility program
a) It is unavailable to users
b) It is part of an integrated package
c) it is written by application users
d)it is considered to be systems software​

Answers

The option that is a feature of a utility program  is that it is considered to be systems software​.

What is a utility program?

Utility-programs are known to be any kind of  program that carry out a particular task that is linked to the management of computer functions, resources,  password protection, etc.

Some Features of Utility Software:

All the software can index folders and files in a matter of seconds. It often keep indexed records through database files, etc.

Utility software are known to bee system software set up to help analyze, configure, optimize etc. on a system.

Learn more about utility program from

https://brainly.com/question/20659068

How many pages is 2000 words double spaced 12 font.

Answers

Answer: 8 pages

Explanation:

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature

Answers

The key would he use to create the digital signature is Mike public key.

Which key is used to sign messages?

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

https://brainly.com/question/17486027

When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.

Answers

Answer:

Border

Explanation:

When adding a component to a container with the BORDER layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.

A ____________ is a collection of infected IT devices that an attacker or attack group controls.

Answers

The answer would be a Botnet .

What bandwidth is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances?.

Answers

The bandwidth that is used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances is Medium band.

What is Medium band?

This is known to be a bandwidth that is often used in some particular leased lines to link up midrange computers and mainframes.

Conclusively, It is also used in  moving data over any long distances. This bandwidth is is known to be very capable of doing any high-speed data transfer.

Learn more about bandwidth from

https://brainly.com/question/4294318

Q2. What is the process of file management?​

Answers

Answer:

The process and act of creating an organized structure in which you store information for easy retrieval.

Explanation:

Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement

Answers

Answer:

The answer is Deterrent

Explanation:

Deterrent controls are administrative mechanisms (such as policies, procedures, standards, guidelines, laws, and regulations) that are used to govern an organization's security execution. Deterrent controls are used to ensure that external controls, such as regulatory compliance, are followed. I hope this helps! ^-^

What occurs when a system produces incorrect, inconsistent, or duplicate data?.

Answers

Answer: Data integrity issues

Explanation:

How should I go about fixing this error in Java?

System.out.printIn("E");
^
symbol: method printIn(String)
location: variable out of type PrintStream
1 error

Answers

Answer:

use println with an L in stead of an I

Explanation:

In this font, the capital i can lowercase L look very similar. If you paste this in notepad, you can see you typed "print in", with an i.

It should be with an L as in print line.

does anyone have experience with raptor

Answers

Answer:

yes, I have experienced with raptor

A thesis statement is the last sentence of the conclusion. It summarizes the entire paper.
True
False

Answers

False. A thesis statement usually introduces the topics or ideas you are going to write about, so this means that it is at the end of the FIRST paragraph.

Answer:

false

Explanation:

Other Questions
Carlos mide 54 pulgadas de estatura cual es la estatura de Carlos en pies? The wavenumber of the incident radiation in a Raman spectrometer is 20487 cm1. What is the wavenumber of the scattered Stokes radiation for the J = 2 0 transition of the molecule N2, being the two N atoms the 14 isotope? PLEASE HELP MEEEE!!!!!!! 50 POINTS AND BRAINIESTRead the stanzas from "I Wandered Lonely as a Cloud" and answer the question.[1]I wandered lonely as a cloudThat floats on high o'er vales and hills,When all at once I saw a crowd,A host, of golden daffodils;[5]Beside the lake, beneath the trees,Fluttering and dancing in the breeze.Continuous as the stars that shineAnd twinkle on the milky way,They stretched in never-ending line[10]Along the margin of a bay:Ten thousand saw I at a glance,Tossing their heads in sprightly dance.The waves beside them danced; but theyOut-did the sparkling waves in glee:[15]A poet could not but be gay,In such a jocund company:I gazedand gazedbut little thoughtWhat wealth the show to me had brought:What is the effect of personifying nature with the ability to dance? It highlights how wild and unpredictable nature can be. It reveals the poet has a very active and creative imagination. It shows there is happiness and joy reflected in nature. It supports the idea that nature and humans are the same. The palace of pizza offers small, medium, or large pizzas with 4 different toppings available. How many different 1-topping pizzas do they serve? d-day explanation 1 paragraph The rectangle below has an area of x^2-7x+10x and a width of x-5x5x meters.What expression represents the length of the rectangle? A student correctly determines that 17.1 grams of sucrose are needed to make 50 ml of a 1m sucrose solution. when making the solution in the lab, the student measured 50ml of solution and then adds the 17.1 grams of sucrose to the beaker. the students resulting solution was not 1m as intended. after the student mixed the solution, the resulting solution was measured at 62ml. Ayo any band orchestra kids out there? I play horn in concert band and orchestra and Im hoping to do marching band soonWhat instruments do u guys play U get 30 pointshhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh Judge Danforth becomes more suspicious of John Proctor when? what is (x, y) (kx, ky) A tessellation, like a mosaic, covers a plane with the same shapes over and over again without any overlaps or gaps. Study the tessellation shown here and answer the questions.A tesellation, like a mosaic, covers a plane with the same shapes over again and again without any overlaps and gaps.Six pairs of figures are marked in the tessellation. Identify which of these pairs of figures are reflections of each other. 100 points and brainliest if you can help Select all the names that the shape below can be called: (This is a multiple choice answer)A: RhombusB: TrapezoidC: RectangleD: QuadrilateralE: SquareF: Parallelogram A 4-column table has 3 rows. The first column is labeled Item with entries 50 inch plasma television, laptop computer, refrigerator. The second column is labeled Rent-to-own payments with entries 65 dollars per week for 1 year, 30 dollar per week for 1 year, 28 dollars per week for one year. The third column is labeled Installment plan with entries 146 dollars per month for 12 months, 100 dollars per month for 12 months, 80 dollars per month for 12 months. The fourth column is labeled Retail price with entries 1,450 dollars, 1,000 dollars, 800 dollars. Joshua is in college, and his computer broke. He can get it repaired, but it will take three weeks. What is the best decision that Joshua can make if he wants to spend the least amount of money? rent a computer for three weeks pay cash for a new computer use a rent-to-own program to buy a new computer use an installment plan to buy a new computer. Robert Schumann was greatly impacted by aperformance of a virtuoso violinist namedA. Nicolo Paganini.B. Antonio Vivaldi.C. Josquin des Prez. A cardboard box is shaped like a cube. The length of each side is 15 inchWhat is the volume of the box, in cubic inches? 100 POINTS!!! 100 POINTS!!!Each month, Morse budgets $3,900 for fixed expenses, $676 for living expenses, and $561 for annual expenses. His annual net income is $67,796. Describe his monthly budget by using a positive number to show how much of a surplus there is, a negative number to show how of a deficient there is, or zero if it is a balance budget.Show work clearly for 100 POINTS!!! 3 more than the quotient of 18 and x Part A Write as a expression Part B evaluate that same expression when X=3 The story in the text about the balloons that were used to suspend a speaker in mid-air was used to illustrate the role of ___________ in memory.