What is the term for when software is installed on a computer without authorization and encrypts files and demands payments in bitcoin before the password to encrypt the files will be provided?.

Answers

Answer 1
Ransomware

Explanation: Cause I’m like that

Related Questions

An IP address specifically belongs to:

Answers

Answer: An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.

Explanation:

Pls help i need all of it today ill make you brainiest


In the text "my friend Walt Whitman" by Mary Oliver


1. Infer oliver does not directly state her purpose for writing. It is up to you to infer it based on details in the text. What is the main purpose for writing?Cite text evidence in your response



2. Evaluate how do the quotations from Whitman create an organization design for the essay? How does this organizational design support Oliver’s ideas?



3. Analyze how does Oliver support in the idea that Whitman was her friend? Cite evidence from the text in your response

Answers

The inference shows that the main purpose of writing the essay was to describe the benefits she got from getting to know Whitman.

What is an inference?

An inference simply means the conclusion that can be deduced based on the information presented in a literary work.

In this case, the main purpose of writing the essay was to describe the benefits she got from getting to know Whitman through his work.

Furthermore, the organizational design supports the idea of Oliver as she's trying to insinuate her writings and thoughts by Whitman's work.

Oliver supported the idea that Whitman was her friend as she was into Whitman's books that she spent most of her mornings reading them. She succored the idea that he was her friend through his poems.

Learn more about inference on:

https://brainly.com/question/24729498

What is the name of an instruction that interrupts a program being executed and requests a service from the operating system

Answers

“Interrupt” is what I think the answer is

Which of the following commands CANNOT be found on the Page Design tab? Question 2 options: Insert a text box Delete a page Change page orientation Specify a color scheme.

Answers

Answer:

The answer is, Insert A Text Box.

Hope this helps.

The command "Delete a page" cannot be found on the Page Design tab. The correct option is B.

What is command?

An instruction or collection of instructions issued to a computer or software program is referred to as a command in computing.

The Page Design tab does not contain the "Delete a page" command.

All of the additional instructions mentioned in the query can be discovered on the Page Design tab or other relevant tabs in different word processing or desktop publishing programs.

A frequently used tool for adding more text or graphic elements to a page is "Insert a text box," "Change page orientation" is frequently used to switch between portrait and landscape mode.

Also the "Specify a color scheme" might let users select from predefined color schemes for the text, background, and other elements.

Thus, the correct option is B.

For more details regarding command, visit:

https://brainly.com/question/3632568

#SPJ6

A monitor is an output device. Which of the following is not a type of monitor? *

Light Emitting Diodes
Cathode Ray Tube
Laser Crystal Diodes

Answers

Answer:

cathode ray tube is the correct answer

What are two advantages and disadvantages of using computer software?

Answers

Answer:

Advantages:

Multitasking

Multitasking is one among the main advantage of computer. Person can do multiple task, multiple operation at a same time, calculate numerical problems within few seconds. Computer can perform millions or trillions of work in one second.

Speed –

Speed –Now computer isn’t just a calculating device. Now a day’s computer has vital role in human life. One of the most advantages of computer is its incredible speed, which helps human to finish their task in few seconds.

Disadvantages:

Virus and hacking attacks –

Virus and hacking attacks –Virus may be a worm and hacking is just an unauthorized access over computer for a few illicit purpose. Virus can go to other system from email attachment, viewing an infected website advertisement, through removable device like USB etc.

Online Cyber Crimes –

Online Cyber Crimes –Online cyber-crime means computer and network may have utilized in order to commit crime. Cyberstalking and fraud are the points which comes under online cyber-crimes.

Advantage: It does EXACTLY what the programmer told it to do.

Disadvantage: It does EXACTLY what the programmer told it to do.

Software is instructions for a computer to follow. A computer will do so virtually always without fail other than the rare hardware or power issues, even in cases where it shouldn’t, and even in cases where any human would instinctively know that the instructions do not apply. I compare programming to writing instructions for a robotic idiot. It must be perfect, it must address every minute detail, and it must handle every case that will ever arise correctly. Humans write software. Perfection is rare for humans.

HELPPP! MARK YOU THE BRAINLIEST!
Write one smart goal It has to be realistic ?
Background information The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound Defining these parameters as they pertain to your goal helps ensure that your objectives are attainable within a certain time frame.

Answers

Answer:

My goal is to have good grades because I failing now and I want to try and try to get my grade up

Explanation:

Why are my texts green when texting another iphone.

Answers

Answer:

The green message background indicates the traditional SMS text message. It actually means a message that you have sent to someone else is through SMS message service instead of Apple iMessage

:

How to check if students viewed an assignment canvas.

Answers

Which app are you using?

This is the tendency for items at the beginning of a list to be recalled more easily than other item:

A.) recency effect
B.)primacy effect
C.) butterfly effect

Answers

Answer:

B. Primacy effect

Explanation:

:3 have a wonderful day hope this helps

Answer:

B. Primacy effect

Explanation:

How can you quickly locate emails with large attachments.

Answers

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

How do I find emails by attachment size?

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

https://brainly.com/question/978078

Portable devices have a software-controlled switch that disables all wireless functionality. What is the name of this software-controlled switch?.

Answers

I think airplane mode but I’m not 100%

10. Version control is a way to store code files with a detailed history of every modification to that code. True or False
This is for computer programming, I’m having a really hard time in this class and I need some help with this question. Any incorrect or spam answers will be reported. Thanks in advance!

Answers

Answer:

true

Explanation:

I hope this helps

I need to code a simple racing game in c++. Help, please. ​

Answers

Can you attach what you have so far

Which of the following is NOT a responsibility of an IT project manager?

A.
writing code

B.
managing the budget

C.
managing the schedule of the project

D.
assigning work to team members

Answers

Answer:

I think that The answer is A.

Explanation:

A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.

In the name, it says Manager.
This is how I know that.

The one that is not a responsibility of an IT project manager is writing code. The correct option is A.

What is IT project manager?

The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.

One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.

Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.

Therefore, the correct option is A. writing code.

To learn more about IT project managers, refer to the link:

https://brainly.com/question/15404120

#SPJ2

A technology specialist is investigating a computer infected with malware. The investigator discovers that a data leak, which reveals the religious and political beliefs of a high-profile executive, results from the malware. Which data type did the malware compromise

Answers

The data type that was compromised by the malware is personally identifiable information (PII).

What is a PII?

PII is an acronym for personally identifiable information and it can be defined as a type of information (data type) that can be used by business firms (companies) on its own or with other relevant data, so as to identify a specific individual.

The examples of PII.

Some examples of personally identifiable information (PII) include the following:

Social Security numbersEmail addressHome address.Full nameReligious and political beliefs.

In conclusion, the data type that was compromised by the malware is personally identifiable information (PII).

Read more on PII here: https://brainly.com/question/24439144

Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing, and classifying data.

Answers

Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.

What is Data protection policy?

These are policies adopted by organizations that help to ensure data is adequately protected.

When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.

Read more about Data protection policy here https://brainly.com/question/26493645

Microsoft cerrar sesion how to change it to english.

Answers

Press the three circles at the top I believe

Which call of the function correctly follows the instructions laid out in the api?.

Answers

Answer:

MoveElement("button1", "down", 25); This function finds the minimum number in a list.

Explanation:

Hope this helps

A row-level trigger requires use of the _____ keywords and is executed once for each row affected by the triggering statement.

Answers

Answer:

FOR EACH ROW

--

Hope this Helps!

A row-level trigger requires use of the  FOR EACH ROW keywords keywords and is executed once for each row affected by the triggering statement.

What is a row-level trigger?

Every row in the transaction has a row-level trigger that runs once. Triggers at the normalized only run once per transaction. used solely for data monitoring. used to enforce all extra security on transactions at the tabletop.

The FOR EACH ROW keywords must be used with a row-level trigger. Each row impacted by the trigger statement receives a single execution of this kind of trigger. A named group of SQL procedural instructions is known as a stored procedure.

Regardless of if the rows are changed by the add, updated, or removal event, a line trigger only fires once per trigger event. For each row impacted by the traumatic incident, a row trigger fires once. The trigger doesn't fire if none of the row are affected.

Learn more about row-level trigger, Here:

https://brainly.com/question/6850610

#SPJ12

A coworker is taking a computer overseas and asks you what concerns he should have. What do you tell him

Answers

Answer:

The components within the computer can get damage during travel, so he could improve the box protection with foam thingies

Explanation:

How do i copy a canvas course from old class to new course.

Answers

Answer:

Open Settings. In Course Navigation, click the Settings link.Copy Course Content. Click the Copy this Course link.Create Course Details. ...Select Migration Content. ...Adjust Events and Due Dates. ...Create Course.

Explanation:

Follow The Steps

That's it

what is live ware in relation to computer​

Answers

Answer:

It is a slang term used to denote people using (attached to) computers.

Your development team is planning to host a development environment on the cloud. This consists of EC2 and RDS instances. This environment will probably only be required for 2 months. Which types of instances would you use for this purpose

Answers

The type of instances would you use for this purpose is known as On-Demand.

What is an on demand instance?

On-Demand Instances is known to be one that allows a person to pay for compute capacity usually by the hour or second with no long-term payment.

This is one that gives one a level of freedom from the costs and complexities of planning, purchasing, and keeping hardware.

Learn more about cloud from

https://brainly.com/question/25130975

when was the first computer built..

Answers

Answer:

1822 but it was a medical computer. not the same as computers today

Explanation:

The first computer was invented in 1822 but was built in 1991. It was invented by Charles Babbage.

Hope this helps!

the bookstore sold 8 books for $66 at that rate how much was one book

Answers

8x=66

8x/8 = 66/8

x=8.25$

True/False: Before a computer can execute a program written in a high level language, such as C , it must be translated into object code. True False

Answers

Answer:

True

Explanation:

who made the game Monopoly???

Answers

Answer:Lizzie Magie, Charles Darrow

Explanation:

During a slide show, Luis wants a picture to appear on one of his slides after the slide appears on the screen. Which type of animation should he use

Answers

The type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

What is an Entrance Animation?

An entrance animation is an effect that controls how an object appears on a slide, starting at the start point of the object.

For example, using the entrance animation, Luis can make the object move slowly into the slide using a float-in effect.

Thus, the type of animation that Luis can use in during the slide show after his slide appears is: entrance animation.

Learn more about entrance animation on:

https://brainly.com/question/20082198

Can someone please help me answer this question.
1. Select the correct answer. What is a digital portfolio?
A. a summary of your portfolio.
B. a presentation of your portfolio
C. a representation of your work
D. a preview of your most important work

2. Hadoop is a popular framework used for storing and processing big data. Which programming language was used while building this framework?
Hadoop is a popular_____ based framework used for storing and processing big data.​

Answers

Answer:

1. C. or D.

2. Hadoop is a popular Java-based framework used for storing and processing big data.​

Explanation:

For number 1 I think it's C because:

A digital portfolio is an online collection of work that represents your abilities and skills as a professional in your field. I could be D aswell!

Hope you do well!

Other Questions
A student draws three vertices of a square on the coordinate plane. The three vertices are X ( 10 , 1 ) , Y ( 10 , 5 ) , and Z ( 4 , 1 ) . Which coordinate pair could be the fourth vertex of the square? what are 4 achievements of Rome A student states that natural resources could be saved if people made everything they need in labs. What is the main problem with this idea?(1 point)There are not enough synthetic resources yet to make what people need.People might think it is fine to waste a lot of the materials since they just came from a lab.The materials made in labs will still pollute the environment and destroy natural resources.Anything made in the lab requires natural resources to produce it. True or false: Clotting factor numbers are in order of their discovery and not their position in the clotting pathway. Consumer Reports recently followed up wilh a survey to its reuden askingpolitical preferences and primary choice of mobile device.There were a tolal ol 11,214 Republican respondents. Of the 9,500 Democrels.470 reported usine a device not listed and 292 soid they used a Window's phone. The total usage of Android devices recorded tooled 8,926: 3,921 of Android users were Republicans. Interestingly, here were an equal number of Apple and Android users reporting as Republicans. There were 4,528Democrats using an Apple device. Only 2,672 of those surveyed reported as independent, 51 said they use a Window's device and 428 said they used an Apple device. There were 3,652 tolal Window's device users sureyed. Assume that each finch comes from a large population of similar finchesin its particular environment. Imagine a drought in the environment ofFinch 1 makes the small seeds they normally feed off of scarce. Describehow natural selection could cause the population of finches in the firstgroup to evolve over time to resemble the population of Finch 2. What is the approximate average power output of a well-designed modern turbine in Des Moines, Iowa with a 10 m2 swept area and 50 m hub height Of these styles of jazz music, which one was the first to develop?A. swingO B. ragtimeO c. bebopO D. cool Which term refers to the standard by which organisms are named?phylumLinnaeus scientificusbinomial nomenclaturetaxonomy If there is less snowpack in the Sierra Nevada's due to drought and warming temperatures, then California will have ___. All of the following are characteristics of good leaders EXCEPT Which line of poetry contains figurative language instead of literal language? A. You look up at the moon and howl B. it has already climbed to your knees C. like a wildfire swallowing a forest D. the first time it happened to me Which meaning of marked most closely matches its meaning in the following excerpt?I need such words from you far more than you can need them from me, especially where your superior labors and devotion to the cause of the lately enslaved of our land are known as I know them. The difference between us is very marked. Most that I have done and suffered in the service of our cause has been in public . . .A. | adjective | having a visible markB. | adjective | clearly noticeable and evidentC. | verb | make a visible stainD. | verb | show the position of What were some ways that the five goodemperors helped Rome to become rich andprosperous? List three factors when you consider a person require complex needs rather than a basic needs Which of the following is NOT true about parallelograms?options:a parallelogram is a rectanglea parallelogram is a quadrilaterala parallelogram has no lines of symmetrya parallelogram has 2 sets of parallel lines sam and jennna decide to purchase a tv on black friday. the sale price is $499. if jenna pays $123 more than sam, how much did sam pay? Evaluate. [(1 1/32/3)(3/4)^3](2) What is the value of the expression? Enter your answer as a simplified fraction in the box. HELP PLEASE ASAP!! THANKS A shop owner gave a 25% discount off the regular price of a table. The amount of the discount is $5.What was the regular price of the mirror? (before discount) If I pass my state test but get bad grades will I pass or fail