Regarding computer protection, quarantining is defined as ________. Select one: A. placing a found virus in a secure area on the hard drive B. deleting an infected file C. repairing an infected file D. updating your antivirus software

Answers

Answer 1
Answer:

Answer:

A. placing a found virus in a secure area on the hard drive

Explanation:

When a file is defected in a computer, quarantining is applied to prevent other parts of the computer. The infected file is isolated and if you let your antivirus software, it can delete the infected file.


Related Questions

Assign True to the variable has_dups if the string s1 has any duplicate character (that is if any character appears more than once) and False otherwise.Here is the answer I wrote:i = []for i in range(len([s1])):if s1.count(s1[i]) > 1:has_dups = Trueelif s1.count(s1[i]) = 1:has_dups = FalseHere is the message I got from the system:Solutions with your approach don't usually use: elifPlease Help me to correct it.
Write a statement that assigns total_coins with the sum of nickel_count and dime_count. Sample output for 100 nickels and 200 dimes is: 300
Which quantity measures the rate at which a machine performs work?
I'm stuck on this Java exercise problem and don't know how to organize my code with proper formatting and it's not helping that I'm pretty terrible at logic. I can't figure out how to return the number of spaces to be displayed in the main method.
2. Use inheritance to create a hierarchy of Exception classes -- EndOfSentenceException, PunctuationException, and CommaException. EndOfSentenceException is the parent class to PunctuationException, which is the parent class to CommaException. Test your classes in a Driver class with a main method that asks the user to input a sentence. If the sentence ends in anything except a period (.), exclamation point (!), or question mark (?), the program should throw a PunctuationException. If the sentence specifically ends in a comma, the program should throw a CommaException. Use a catch block to catch all EndOfSentenceExceptions, causing the program to print a message and terminate. If a general PunctuationException is caught, the program should print "The sentence does not end correctly." If a CommaException is caught, the program should print "You can't end a sentence in a comma." If there are no exceptions, the program should print "The sentence ends correctly." and terminate.

On a roulette wheel, the pockets are numbered from 0 to 36. The colors of the pockets are as follows: Pocket 0 is green. For pockets 1 through 10, the odd-numbered pockets are red and the even-numbered pockets are black. For pockets 11 through 18, the odd-numbered pockets are black and the even-numbered pockets are red. For pockets 19 through 28, the odd-numbered pockets are red and the even-numbered pockets are black. For pockets 29 through 36, the odd-numbered pockets are black and the even-numbered pockets are red. Write a program that asks the user to enter a pocket number and displays whether the pocket is green, red, or black. The program should display an error message if the user enters a number that is outside the range of 0 through 36.

Answers

Answer:

pkt = int(input("Pocket Number: "))

if pkt == 0:

   print("Green")

elif pkt >= 1 and pkt <=10:

   if pkt%2 == 0:

       print("Black")

   else:

       print("Red")

elif pkt >= 11 and pkt <=18:

   if pkt%2 == 0:

       print("Red")

   else:

       print("Black")

elif pkt >= 19 and pkt <=28:

   if pkt%2 == 0:

       print("Black")

   else:

       print("Red")

elif pkt >= 29 and pkt <=36:

   if pkt%2 == 0:

       print("Red")

   else:

       print("Black")

else:

   print("Error")

Explanation:

The program was written in Python and the line by line explanation is as follows;

This prompts user for pocket number

pkt = int(input("Pocket Number: "))

This prints green if the pocket number is 0

if pkt == 0:

   print("Green")

If pocket number is between 1 and 10 (inclusive)

elif pkt >= 1 and pkt <=10:

This prints black if packet number is even

   if pkt%2 == 0:

       print("Black")

Prints red, if otherwise

   else:

       print("Red")

If pocket number is between 11 and 18 (inclusive)

elif pkt >= 11 and pkt <=18:

This prints red if packet number is even

   if pkt%2 == 0:

       print("Red")

Prints black, if otherwise

   else:

       print("Black")

If pocket number is between 19 and 28 (inclusive)

elif pkt >= 19 and pkt <=28:

This prints black if packet number is even

   if pkt%2 == 0:

       print("Black")

Prints red, if otherwise

   else:

       print("Red")

If pocket number is between 29 and 36 (inclusive)

elif pkt >= 29 and pkt <=36:

This prints red if packet number is even

   if pkt%2 == 0:

       print("Red")

Prints black, if otherwise

   else:

       print("Black")

Prints error if input is out of range

else:

   print("Error")

An example of negative self-talk is:

Answers

Answer:

when you call yourself fat or ugly......but that was my answer but pls dont ever be negative abt yalls selfs i love yall the way u are and if u eva wanna talk ill do it in the comments

Explanation:

Answer:

for example, when there is a bad driver on the road near you does something dumb and the little voice in your head always says you idiot watch where you are going. It also can be when you put yourself down like saying that you are dumb or that you will never get a job

What game is this? help mee?

Answers

Answer:

nooooooo

Explanation:

You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?

Answers

Answer:Encryption is the process

of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.

Types of encryption

1.Symmetric encryption :This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.

2.Asymmetric encryption :This is foundational technology for SSL(TLS)

How encryption is being configured

Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.

Explanation:

When forced distribution is used to reduce leniency bias, this can cause __________ if a pfp system is in place?

Answers

When forced distribution is used to reduce leniency bias, this can cause <decreased trust> between employees if a pfp system is in place.

Answer:

When forced distribution is used to reduce leniency bias, this can cause (decreased trust between employees) if a pfp system is in place.

Explanation:

Please give me Brainlest!

Discuss and compare shared and switch Ethernet

Answers

Answer:

Shared ethernet is the type of virtual input and output server components that is used to connect physical ethernet to the virtual ethernet in the network.

In the shared ethernet, the physical network easily access by the virtual network. It uses stand alone server for communication in the network.

On the other hand, switch ethernet uses the point to pint connection between the segment and host.

Switch ethernet has dedicated bandwidth and it is also known as desktop switching ethernet. In the switch ethernet, the hub is replace with the switching hub in the network.