Education technology

Which of the following helps prevent your computer from becoming infected with malicious code?

Open all emails with attachments that aré from stanger

Is sure your computer gets open up and the dust cleaned out of its regularly.

install and regularly run updated antivirus software ••

Download and install software from the Internet, regardless of whether it has been proven to come from safe and secure site

Correct me

  1. 👍
  2. 👎
  3. 👁
  1. Right

    1. 👍
    2. 👎
    👤
    Writeacher
  2. 1.d
    2.c
    3.d
    4.c

    i got 100

    1. 👍
    2. 👎
  3. Yeah Carebob is correct from what i can see.

    1. 👍
    2. 👎
  4. Carebob is correct 100%

    1. 👍
    2. 👎
  5. shf

    1. 👍
    2. 👎

Respond to this Question

First Name

Your Response

Similar Questions

  1. Technology

    Which of the following is not an example of malicious code? A. Trojan horse B. worm C. virus D. spy gear**

  2. Educational Technology helppppp

    which of the following is considered an output device? Printer*** Scanner Keyboard Memory Which component is being described below? This component in an input device. It helps bring information to the computer by permitting the

  3. Computer

    What types of issues can you likely resolve by knowing how to access and use the Control Panel? Choose all that apply. network issues*** screen resolution and volume issues**** frozen application issues virus issues What can help

  4. Education technology

    Which of the following is not an example of malicious code? A. Trojan horse B. worm C. virus D. spy gear ••

  1. Ed Tech plz helppppp

    What does it mean to troubleshoot your computer? identify problems with your computer and attempt to fix them*** to open your computer to see what's missing from the hard drive to switch the mouse and keyboard plugs to download

  2. Computer Literary

    Which of the following is Not an example of debugging A)Looking for errors in programming code B)Fixing misspelled commands in programming code C)Solving faulty logic in programming code D)Upgrading to improve the programming code

  3. Calculus

    During a certain epidemic, the number of people that are infected at any time increases at rate proportional to the number of people that are infected at that time. 1,000 people are infected when the epidemic is first discovered,

  4. History

    Which best suggests why Russia, China, and North Korea engage in malicious cyberattacks? The populations of these nations rank high in computer literacy. Their languages feature non-English fonts which aid encryption. They are

  1. Ed Tech

    What does the code of conduct include? A. A secret code for internet users B. The conduct that should be used with a code C. A set of rules for behavior when using the internet D. A rule that tells you the code I think C Thanks!

  2. History

    Which cyberattack carries the most serious threat? A phishing attack on a chain store compromises customer data. A malware attack shuts down the power plants in a large city. Hackers launch a malicious code that shuts down

  3. Science

    Which choice most accurately explains the role of a circuit component in preventing a circuit from getting too hot and catching fire? (Select all that apply) 1-A fuse can be used to prevent a circuit from getting too hot. It will

  4. Career exploration

    1. Information security professionals hack into computer systems. (1 point) True False 2. What kind of network might you have at home? (1 point) LAN WAN wireless intranet 3. Apps are designed by: (1 point) software developers.

You can view more similar questions or ask a new question.