You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?
A. Quarantine Vivian's computer.
B. Disable System Restore.
C. Perform a scan using anti-malware software.
D. Back up Vivian's critical files and perform a clean install of Windows.

Answers

Answer 1

Answer: D

Explanation: Using anti malware software is a good method but you can never be 100% sure it's gone and the software may not detect it, better to start off clean.

Answer 2
The answer is D hope it helps

Related Questions

How Many types of application Software are there?​

Answers

Answer:

there are 2 types of application software

what is the most improved Android robot​

Answers

Answer:

They are the humanoid robots.

what is it important to test cabless?​

Answers

Answer:

to avoid larger problems ovr time like having to replace a whole line after it has been installed in case it happens that there may be faults you may know whether it was caused by a manufacturer error or installation error

Discuss how 3D modeling enhances animation.

Answers

Answer:

3d modeling enhances animation in many ways.

Explanation:

The first and most obvious way is shadows. When 3d modeling your able to cast more detail shadows then compared to 2d.

Which function below will allow you to change to a different screen?

changeScreen( )

changePage( )

setPage( )

setScreen( )

Answers

Answer:

Option D

Explanation:

The Set Screen command is used to change the screen to any screen you wish. Screen is notified by its ID

The set screen command is used for some user -event and in such cases set screen is added by click event handler.  

The ID to which the screen is to be changed is selected.

Hence, option D is correct

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

What are the steps for creating a bookmark? 1. Place the insertion point where the bookmark should appear. 2. Click the tab. 3. In the group, click Bookmark. 4. When a dialog box opens, name the bookmark, and click . 5. To see bookmarks within the document, go to Backstage view and click Options. 6. In , select Show Bookmarks to have them appear as a locked cursor within the document.

Answers

Answer:

2. Insert

3. Links

4. Add

6. Advanced

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

On the other hand, a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

A bookmark can be defined as a placeholder or saved shortcut for a webpage and for future reference. Thus, it avails an end user the ability to quickly access a bookmarked webpage by automatically directing the web browser to the webpage.

Basically, the steps for creating a bookmark are;

1. The insertion point of the webpage should be placed at the point where the bookmark should appear.

2. Click the "INSERT" tab.

3. In the "LINKS" group, click "Bookmark"

4. When a dialog box opens, the bookmark should be named with a specific title, and then click "ADD"

5. To see bookmarks within the HTML document, you should go to Backstage view and click on "Options"

6. In ADVANCED, select Show Bookmarks to have them appear as a locked cursor within the HTML document.

Evaluate:
(3.7 x 10-2) (1.2 x 103)​

Answers

Answer:

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 44.4[/tex]

Explanation:

Given

[tex](3.7 * 10^{-2}) (1.2 * 10^3)[/tex]

Required

Evaluate

[tex](3.7 * 10^{-2}) (1.2 * 10^3)[/tex]

Remove bracket

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 3.7 * 10^{-2}*1.2 * 10^3[/tex]

Rewrite as:

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 3.7 *1.2* 10^{-2} * 10^3[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^{-2} * 10^3[/tex]

Apply law of indices

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^{-2+3}[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10^1[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 4.44* 10[/tex]

[tex](3.7 * 10^{-2}) (1.2 * 10^3) = 44.4[/tex]

Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network

Answers

Answer:

  Port      a number used within a computer to identify a specific process.

   IP Address     a numerical reference to a particular device in a network.

   Server           a computer that handles requests and returns data to other computers in a network.

Explanation:

A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;

i. a file transfer protocol (FTP) could use a port number of 20 or 21.

ii. a simple mail transfer protocol (SMTP) could use a port number of 25

Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90

A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers  in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.

Answer:

IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network

port: a number used within a computer to identify a specific process

server: a computer that handles requests and returns data to other computers in a network

Explanation:

edge 2022

A programmer notices the following two procedures in a library. The procedures do similar, but not identical,
things.

Procedure square (n) returns the value n2

Procedure cube (n) returns the value n3

Which of the following procedures is a generalization of the procedures described above?
A. Procedure Add (n, m), which returns the value n + m
B. Procedure Fourth (n), which returns the value n4
C. Procedure Polynomial(n), which returns the value n3 +n2
D. Procedure Power (n, m), which returns the value nm

Answers

Answer:

D. Procedure Power (n, m), which returns the value n^m

Explanation:

Given

[tex]square(n) \to n^2[/tex]

[tex]cube(n) \to n^3[/tex]

Required

The generalization

The given functions are power functions which returns the power of n to a certain value.

The power sequence follows:

[tex]fourth(n) \to n^4[/tex]

[tex]fifth(n) \to n^5[/tex]

[tex]sixth(n) \to n^6[/tex]

------

-----

--

[tex]power(n,m) \to n^m[/tex]

Hence, (d) is correct

Write a program that takes as input: - the current hour - the number of hours to add and outputs the new hour. For example, if the inputs are 2 (as the current hour) and 51 (as the number of hours to add), your program should output the answer from part (a) of this problem. Note that your program should always output an integer between 1 and 12. We will get you started with this program with the two lines that gather the input from the user. You'll need to write the rest.

Answers

Answer:

The program in Python is as follows:

cTime = int(input("Current Hour: "))

while(cTime <1 ):

   cTime = int(input("Current Hour: "))

aTime = int(input("Additional Hours: "))

while(aTime <0):

   aTime = int(input("Current Hour: "))

tTime = cTime + aTime

tTime%=12

print("New:",tTime,"hours")

Explanation:

This gets input for current time

cTime = int(input("Current Hour: "))

The following ensures that the user enters a time greater than 0

while(cTime <1 ):

   cTime = int(input("Current Hour: "))

This gets input for additional time

aTime = int(input("Additional Hours: "))

The following ensures that the user enters a positive time

while(aTime <0):

   aTime = int(input("Current Hour: "))

This calculate the new hours

tTime = cTime + aTime

This gets the hour equivalent between 1 and 12

tTime%=12

This prints the new hour

print("New:",tTime,"hours")

what is a fixed expense
everfi

Answers

Answer:

A fixed expense is an expense that has a constant total expense value (the total amount of the fixed expense) that remains the same (does not change) when there is a change in the number being managed, manufactured, or sold

Examples of fixed  expense includes; depreciation of assets, salaries of workers, payment for rental lease, and some utility payment, such as road users toll fees payment at a toll gate

Explanation:

Which form(s) of credit would be most appropriate for the receipt of a utility bill? (Select all that apply.) à. Charge card b. Revolving credit (credit card) C. Installment credit d. Service credit e. Line of credit​

Answers

Answer:

d. Service credit

Explanation:

How are sensors and microprocessors used to control a central heating system which uses an oil burner as the source of heat

Answers

Answer:

sensors are used to measure physical quantities such as temperature, light, pressure, sound, and humidity. They send signals to the processor . a security alarm system may have an infrared sensor which sends a signal when the beam is broken.

Explanation:

im just smart lol

Write 4 types of viruses , explain them briefly.

Answers

I can help with two.

Web Scripting Virus, A sneaky virus that targets popular websites. What this virus does is overwrite code on a website and insert links that can install malicious software on your device. Web scripting viruses can steal your cookies and use the information to post on your behalf on the infected website.

FILE INFECTOR, targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

define client and.server​

Answers

Answer:

Client-server model is a model is a distributed application structure that partitions

tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.

Can someone help me with Edhesive 8.3 lesson practice question number 5? I can’t figure it out

Answers

Answer:

3

Explanation:

- Items in a ______ are enclosed in square brackets​

Answers

Answer:

list.

Explanation:

Items in a list are enclosed in square brackets​

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

Which of these is not a nonverbal cue?

main idea
posture
volume
eye contact

Answers

Answer:

volume and not the remaining ones

Which is an example of a table style option?

O banded columns
O shading
O borders
O pen color

Taking the unit test please help ASAP

Answers

Answer:

a. banded columns

Explanation:

A table style is a collection of attributes that are used to format tables. With table styles, formatting such as borders, row strokes and column strokes can be applied to the table.

There are six options in the table style option in Microsoft word. They are;

i. Banded rows: shows banded rows in which odd rows are formatted differently from even rows.

ii. Banded columns: shows banded columns in which odd columns are formatted differently from even columns.

iii. First column: shows special formatting for the first column of the table.

iv. Last column: shows special formatting for the last column of the table.

v. Header row: shows special formatting for the first row of the table.

vi. Total row: shows special formatting for the last row of the table.

To show these options;

i. First insert a table in the document

ii. Click anywhere on the table and a 'Table tools' option will appear at the top of the menu bar.

iii. Click on the 'design tab' of the 'Table tools' and the table style option ribbon will appear at the top left of the page. A figure showing this has been attached to this response.

Planning to finance higher education helps people prepare for their financial future because it teaches them about

Loans and interest
Savings and accounts
Filing taxes
Short term goals

Answers

Answer:

savings and account

Explanation:

because that will convince them

Answer:

Loans and Interests.

Explanation:

Edge

5. Lael is always on the lookout for students who might be interested in running for office in student groups. In cell M2, enter a formula using a nested IF function as follows to determine first if a student has already been elected to office in a student group, and if not, whether that student meets the qualifications to run in the future: a. If the value in the Elected column is equal to the text "Yes", the formula should display Elected as the text. b. Otherwise, the formula should determine if the value in the Finance Certified column is equal to the text "Yes" and return the text Yes if true And No if false

Answers

Solution :

It is given that Lael always looks out for the students who are interested in running for the office in a student group.

We use an excel sheet to determine whether a student had already elected to the office of the student group or not.

The formula used for the excel sheet used is :

[tex]$=IF(EXACT(K3,"Yes")."ELECTED", "Yes",IF(K3,'Yes),"Yes","No"))$[/tex]

                K                        L                             M                    N          

   Elected group    Finance certificate            

          Yes                    Yes                              Yes

          No                     Yes                               Yes

          No                      No                                No

What is the organizational management practices on planning during a pandemic like corona virus.

Answers

Answer:

wear a mask use hand sanitizer dont get in contact with anyone between 6 feet

Explanation:

A collection of wiress connecting the CPU with main memory that is used to identify particular location is called

Answers

Answer:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory. The width of the address bus (that is, the number of wires) determines how many unique memory locations can be addressed.

Explanation:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

What is CPU?

The electronic equipment that carries out the instructions included in a computer program is known as a central processing unit (CPU), sometimes known as a central processor, main processor, or simply processor.

The CPU executes fundamental mathematical, logical, controlling, and input/output (I/O) activities as directed by the program's instructions. In contrast, specialized processors like graphics processing units and external components like main memory and I/O circuitry (GPUs).

Although CPUs' shape, design, and implementation have evolved throughout time, their basic function has remained mostly same. The arithmetic-logic unit (ALU), which performs arithmetic and logic operations, processor registers.

Therefore, Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

To learn more about CPU, refer to the link:

https://brainly.com/question/16254036

#SPJ5

Jax earned 144 points on a research project. In this situation, what is the number 144? Group of answer choices data information knowledge output

Answers

Answer: data

Explanation:

Data refers to symbols or numbers that aren't meaningful. It's an an individual unit which consists of raw materials. Data hato be interpreted in order to become meaningful. They are fact or figures. Examples of data include 24, London, 144 etc.

Information on the other hand is a data that has been processed. e.g. Bob has an aggregate score of 144. Based on the question given, the number 144 is a data as it isn't meaningful yet.

Answer:

The answer is A

Explanation:

"as data"

Investigar cuáles son los Sistemas Operativos más utilizados en la actualidad. ¿cuáles son las características principales de cada uno? Ventajas y Desventajas.

Answers

Answer:

Un sistema operativo es un programa de computadora o colección de programas de computadora que tiene como objetivo facilitar el uso de una computadora, proporcionando el enlace entre el hardware de la computadora y los programas de aplicación que el usuario desea ejecutar en la computadora. El sistema operativo es responsable de la gestión del hardware central, la coordinación de las actividades informáticas y la distribución de recursos en la computadora. Puede verse como lo "básico" de la computadora: un conjunto estandarizado de reglas que determina cómo los programas y los usuarios pueden usar las diferentes partes de la computadora.

Los sistemas operativos modernos comunes incluyen Microsoft Windows, Mac OS, Linux, BSD y Solaris. Microsoft Windows tiene una fuerte participación de mercado dominante para computadoras de escritorio y portátiles. Sin embargo, las computadoras que se usan como servidores ejecutan con mayor frecuencia Linux u otros sistemas similares a Unix.

Drag each tile to the correct box.
Match the visual elements of design to the effect they produce.

Answers

Answer:

Creates order and harmony → color

Creates an emotional impact → texture

Brings a feeling of depth to a design → form

Draws or minimizes attention → space

Divides space and redirects the eye → shape

Explanation:

The visual element that creates order and harmony is color

Color can be used to create visible patterns that can be recognized as being in harmony or disagreement

The visual element that creates emotional impact is texture

Texture can be used to convey either the emotions of the object or the artist

The visual element that brings a feeling of depth to a design is form

Form is used to present a 3-D appearance of an art, and therefore, it is used to show depth of a 2-D drawing

The visual element that draws or minimizes attention is space

The arrangement, location, and size of the space occupied by an object can be used to draw or minimize attention

The visual element that divides space and redirects the eye is shape

Shape is used to divide space into areas easily recognizable by the eye

The content an craigalist is mainly monitered by?
A) users
B)government
C)employer
D)no one

Answers

D)no one

..........................................

In terms of technology, wich of the four devices is the most recent?

a. keyboard
b. joystick
c. scanner
d. camera​

Answers

Joystick (1972)

They consider the typewriter a keyboard…late 1800’s
Scanner (1957)
Camera (late 1800)
Other Questions
can someone write my essay for me its due in an hour pls help asap!! (100 points) Two mechanics worked on a car. The first mechanic worked for 5 hours, and the second mechanic worked for 15 hours. Together they charged a total of $1025. What was the rate per hour by each mechanic if the sum of the two rates was $105 per hour? A container holds 3.01 grams ofcalcium powder for dogs. What is itsweight in centigrams?Conv3,010 cg301 og30.1 cg0.0301 ogWhat is its weight in centigrams A nurse mixes 90 cc of a 45% saline solution with a 10% saline solution to produce a 20% saline solution. How much of the 10% solution should he use? what does the picture show?? HURRY HELP NOW :( WHATS IS THE SUMMARY OF THE HOPE CHEST CHAPTER 5 A 16-foot ladder is leaning against a wall and the bottom of the ladder is 7 feet fromthe bottom of the wall. How high up the wall is the ladder touching?round to the nearest tenth rewrite the following senteces using the verbs in brackets in corect tense.a)the sun (set) in the west.b)we (have) a lot of fun in our last year's college programme.c)you will not have to be afraid of anybody if you (be) not wrong.d)i (start) written the essay when i was in class seven.e)our principal used to (give) us moral support and encouragement frequetly.f)in the past, trains used to be (drive) by steam. what is the meaning of history What is the reciprocal of -3 2/7 ? -3 7/2 -23/7 -7/23 3 2/7 what is thermodynamics ??? don't explain .-. !!! Given the points A(-3, -2) and B(6, 1), determine the coordinates of point P on directed line segment that partitions in the ratio 2/1. PLSSS HELPP ASAPEach of the following data sets has a mean of 5. Which has the greatest variability? (no calculations are necessary).{1, 3, 5, 7, 9}. {1, 1, 1, 1, 21}. {3, 4, 5, 6, 7}D. {5, 5, 5, 5, 5) What is the slope of the line?7x+2y=5 Help pls its urgent. If your able to solve it than Id really would appreciate you. Find the middle point, M, of ab Assume that a file contains students ids, full names, and their scores (Assignments grade, quizzes grade, Midterm grade, Practical exam grade, and final exam grade) (each column is separated by $). You are required to write a C program to do the following: Using the concept of parallel arrays create records for students with above attributes (id, full name, score).(you are not allowed to use structure) Ask the user to enter the input file name and read it (suppose that, there are different files you could read data from). Read the data from the file and store it in record for students, which has IDs, Names, and Scores. The IDs should be declared as integers, the Names as a two-dimensional array of characters and the Scores as doubles. Assume that the maximum length of full name of any student is 50 characters. Also, you may assume that there will be No more than a 1000 student records in the file. Calculate the final grade as the flowing: Grade= (Assignment)*15%+(Quizzes) *15%+(Midterm exam) *25%+(Practical Exam) *10%+(Final) *35% Assuming that data in files are arranged in same order of the above equation with respect to grades Hint: read form file, calculate the final score, and store it in the record before going to the next step. Display the following menu to the user and read the entered choice: 1) Sort data in ascending order according to students IDs and then display it. 2) Sort data in ascending order according to students names and then display it. 3) Sort data in descending order according to students scores and then display it. Note: After running any of the above menus items, ask the user if he/she would like to save the current result, if so, prompt user to enter file name. 4) Ask the user to enter a student ID and display his score 5) Ask the user to enter a student name and display his score 6) Exit the program The program should keep displaying the menu until the user selects to exit from the program. Implement each of the first five menu options as a separate function. The attached file data.txt is for test. Which of the following innovations would be MOST likely to help African farmers?I. Development of frost-resistant strains of seeds.II. The invention of grain seeds that grow in hot, arid climates.III. Introduction of farming methods suited to growing food in limited space.IV. Development of chemical fertilizers that improve nutrients in the soil. I and II I and III II and III II and IV III and IV Please help!An 80% confidence interval is found to be (200,240). What is the margin of error? O A. 32 O B. 20 O C. 40 O D. 16 SUBMIT 1. Tyrone is riding his newly bought motorcycle at 30 m/s when he sees a cat on the road ahead. He applied immediately the brakes and comes to a stop in 3.0 s. What was the acceleration of his motorcycle?Given:Asked:Solution:Final Answer:2. A jeepney speeds up from 50 km/h to 60 km/h to overtake a truck. If this requieres 20 s, what is the (a) acceleration and (b) distance traveled by the car?Given:Asked:Solution:Final Answer:Pls help