Joann turned on her Windows 10 computer today, and while the computer was booting up, it shut down. She restarted the computer and it booted fine but ran slowly. She opened Task Manager and noticed that her CPU was running at 98% capacity and her network at 75% capacity. When she checked to see what process was using so much network connectivity, she received a message saying that access to the process was denied.Based on these indicators, what should Joann do with her computer? (Select all that apply.)
A. Run antivirus software.
B. Disconnect from the network.
C. Refresh Windows.
D. Roll back to a previous restore point.
E. Check the file permissions.
Ans: A, B, & E
You might also like to view...
Given the structure type and variable definitions
``` struct ShoeSize { char width; int number; }; struct ShoeType { char style; ShoeSize size; double price; }; ShoeType shoe1, shod2; ``` What type do these variables have? a) shoe1.style b) shoe2.size c) shoe1.size.width d) shoe2.price e) shoe1.size.number
In working with diverse clients, practitioners should be aware of issues related to self-esteem, identity formation, isolation, and role assumption. All of these issues are LIKELY related to which of the following?
A. Cultural history B. Family structure C. Diversity within culture D. Minority status
Which of the following does full disk encryption prevent?
A. Client side attacks B. Clear text access C. Database theft D. Network-based attacks
One month after a software developer was terminated the helpdesk started receiving calls that several employees' computers were being infected with malware. Upon further research, it was determined that these employees had downloaded a shopping toolbar. It was this toolbar that downloaded and installed the errant code. Which of the following attacks has taken place?
A. Logic bomb B. Cross-site scripting C. SQL injection D. Malicious add-on