List any four routes of transmission of computer virus.
please give me answer​

Answers

Answer 1

Opening attachments or links from unknown or spoofed emails. note: shown above are two examples of how viruses can often appear as legitimate messages, but are designed to trick the computer user. ...

Downloading software from malicious sites. ...

Online Ads. ...

Social media. ...

Unpatched software.

follow me

Answer 2

The routes of the transmission of computer virus include:

Downloading infected files.Shared devices.Corrupt email attachments.Infected drives.

A computer virus refers to a malicious piece of computer code that is designed in order to damage a device or steal data.

The routes of infection for a computer virus include attached files, external storage media, downloading infected files, sharing infected devices, etc.

Read related link on:

https://brainly.com/question/19584310


Related Questions

what is the best phone company that sells long lasting battery life phones?​

Answers

Answer:

A lot of people won't agree with me, but I have had phones from a variety of companies and found Motorola phones to be by far the best.

Explanation:

Answer:

apple but sometimes the batterys be breaking  fast lol

Explanation:

Eliza needs to share contact information with another user, but she wants to include only certain information in the

contact. What is the easiest way for her to achieve this?


A. Use the Edit Business Card dialog box to control the information included.

B. Export only select fields from the contact.

C. Save the contact as a VCF file.

D. Share your contacts foler with other user.

Answers

Answer:

A. Use the Edit Business Card dialog box to control the information included.

Explanation:

b was incorrect but A is correct on edge 2020 I did the unit test review

Using the Edit Business Card dialog box to control the information included is the easiest way for her to achieve this. Thus option A is correct.

What is information?

Knowledge acquired by study, discussion, research, or education is referred to as information. Data is, in essence, the outcome of the data analysis and interpretation process. Info is the interpretation of those elements of knowledge, whereas data is the particular measurements, figures, or diagrams.

She can do this most easily while using the Edit Business Card Combobox to modify the material included. When you get a new email, a meeting submission, or a task plea, a notification called a pc alert flashes up on your computer. Desktop Alerts are on by default.

Depending on the product on the content you get in your Outlook, a Desktop Alert may or may not display certain information. Therefore, option A is the correct option.

Learn more about information, Here:

https://brainly.com/question/13629038

#SPJ5

Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.

Answers

Answer:

Below is an executive summary of this particular issue.

Explanation:

Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.

Answer:

In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.

The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.

For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.

Explanation:

Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.

Answers

Answer:

Creates innovation

Takes and makes decision

Organizing resources

Takes and bears risks

Answer:

FOUR THINGS ARE DOWN

Explanation:

● Creates innovation

● Takes and makes decision

● Organizing resources

● Takes and bears risks

RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977 in an effort to help ensure Internet security. RSA uses modular arithmetic and elementary number theory to do computations using two very large prime numbers. Identify the statement which is true for RC6 algorithm:________.
a) Is a variable key-size stream cipher with byte-oriented operations and is based on the use of a random permutation
b) Includes integer multiplication and the use of four 4-bit working registers
c) Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds
d) Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits

Answers

The answer is B) includes integer multiplication and the use of four 4-but working registers

You use a cisco 2900 router in your network. you are considering purchasing and implementing the Unifield communications feature set on this router. however, you would like to evaluatie this feature set for a period of time prior to pruchasing it whcih command activate the evaluation right to use license for this feature set?

Answers

Explanation:

License boot module c2900, technology-package uck9

Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data

Answers

Answer:

A

Explanation:

Ethernet connections allow the most mobility for users

Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access

Answer: D. The actual speed of a network can differ from the maximum advertised speeds



Explanation:

just got it correct on the test

Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective data______program.
a. data structuring.
b. data privacy.
c. data recovery.
d. data piracy.

Answers

Answer:

b. data privacy

Explanation:

one of the importance jobs is establishing an effective data privacy program inorder to keep tracks of sensitive information or documents and how it is collected, stored, and use.

Data privacy which is also refer to as information privacy is the aspect of information technology that deals with the capacity of an organization in safeguarding the information received.

Which of the following is true? a. Pseudocode is used to describe an algorithm. b. Pseudocode is not an actual computer programming language. c. Pseudocode is used to describe executable statements that will eventually be translated by the programmer into a program. d. All of the above.

Answers

Answer:

Correct answer is:

d. All of the above

Explanation:

First of all, let us learn about a pseudo code:

Pseudo code: It is an implementation of any algorithm written with the help of annotations and text using in simple English. (So, point a. is true)

It is written in English so its syntax is not like any actual programming language. (So, point b. is true)

Pseudo code describes what each line of pseudo code will do so the code writing becomes easier simply by translating the pseudo code to actual programming language syntax i.e. point c. is true.

Hence, point "d. All of the above" is true.

Advantages of Pseudo code :

It makes the readability of the program idea/approach better.Code writing becomes easier for the programmer.

Correct answer is:

d. All of the above

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

urgent ..algorithm and flowchart to check weather a number is odd or even ???​

Answers

Answer:

if it's 0 then the number is even.else number is odd

Explanation:

if it's divisible by 2.then the reminder will be 0,

then the number is even.

thanks

Answer:

Hello!!!

I'm not sure about first one but second is correct one.

no. means number (i didnt had place so)

so, i hope it helps you a little....

Meaning of software

Answers

Answer:

Is a collection of data or computer instructions that tell the computer how to work.

Explanation:

Escribe todas las posibles combinaciones que pueden haber entre 4 bits.

Answers

Answer:

The answer is "[tex]\bold{2^n\ \ _{where} \ \ \ n \ is\ bit }[/tex]"

Explanation:

The Combinations could be produced by using n-bits [tex]2^n[/tex] . It s enables you to generate the 4-bit numbers that are:

[tex]\to 2^4 = 16[/tex] combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

Consider the following code snippet. File hoursFile = new File("hoursWorked.txt"); Your program must read the contents of this file using a Scanner object. Which of the following is the correct syntax for doing this? Scanner in = new Scanner("hoursWorked.txt"); Scanner in = new Scanner(hoursFile); Scanner in = Scanner.open(hoursFile); Scanner in = Scanner("hoursWorked.txt");

Answers

Answer:

Scanner in = new Scanner(hoursFile);

Explanation:

The syntax to read the content of a file after the file has been created/initialized is as follows;

Scanner [variable-name] = new Scanner([object-name]);

From the question above, the [object-name] is hoursFile

Substitute [object-name] with hoursFile, the syntax becomes

Scanner [variable-name] = new Scanner(hoursFile);

[variable-name] can be anything as long as it follows variable naming convention;

From the list of given options, the option that answers the question is: Scanner in = new Scanner(hoursFile);

Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software components. c. Performing a task in a program requires a method. d. A class is an instance of its object.

Answers

Answer:

A class is an instance of its object

Explanation:

What is the best use of a line chart? (A.)to show parts of a whole while emphasizing specific data,(B.)to compare and contrast discrete categories of data,(C.)to display data that changes over time(D.)to display data points that are unconnected and distinct

Answers

I think the answer to the question is C

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information? a. LDAP poisoning b. LDAP injection c. Kerberos injection d. DAP hijacking

Answers

Answer:   b. LDAP injection

Explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input. It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So, LDAP injection is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

Answer:

dap

Explanation:

you suck 1v1 me epic Jayden rock star

How to do this question , please answer quickly , I’ll give branliest

Answers

Answer:

First you analyze all the data that your program needs. You can do this by drawing UML diagrams or whatever you find convenient.

In your case you'll model an item, a stock, supplier and user. You may not end up implementing all of that, but it's good to get a feel for the extent of your assignment.

You can then define use-cases, i.e., tasks or flows through your program, in your case these would simply be the tasks of your 5 menu options. You can write down what happens to the modeled data for each of those flows.

The combination of the use-cases and data modeling will make clear what data structures you'll actually need. For example, the role of the supplier name is unclear. From the requirements it doesn't say if that has to be stored somewhere.

Note that we haven't talked about programming yet at this stage. This is your analysis.

Then you choose a programming language and start implementing. Test corner cases and unexpected input (like empty lists, quantities of zero and negative).

What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; } Move the duplicated code outside of the if statement Shorten variable names Move the brackets to save several lines of code Add semicolons after the if condition and the else reserved word

Answers

Answer:

Move the duplicated code outside of the if statement

A college marketing department has a networked storage device that uses the IP address 10.18.7.5, TCP port 443 for encryption, and UDP port 4365 for video streaming. The college already uses PAT on the router that connects to the Internet. The router interface has the public IP address of 209.165.200.225/30. The IP NAT pool currently uses the IP addresses ranging from 209.165.200.228-236. Which configuration would the network administrator add to allow this device to be accessed by the marketing personnel from home

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The static NAT stands for (static Network Address Translation), which enables the user to modify a single interpretation for a local second-order to the external environment addresses, and all IP and port numbers were also transcribed inside to random traffic as well as from outside with the internal traffic.

It is used to map network traffic by an internal IP address from a static external IP address. It provides a fixed conversion for actual addresses onto maps. It offers Internet access to the network equipment via a private LAN with such a private IP address which is not recorded.Please find the attachment of the ip address.

Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O. b. Tubes are synchronized communication channels between threads. c. A filter stream provides additional functionality, such as aggregating data bytes into meaningful primitive-type units. FilterInputStream and FilterOutputStream are typically extended, so some of their filtering capabilities are provided by their concrete subclasses. d. A PrintStream performs text output. System.out and System.err are PrintStreams.

Answers

Answer:

The answer is "Option b".

Explanation:

Tubes were streams among processes, that are interconnected. It is coordinated ways to communicate between threads, that's why the only option b is wrong, and the correct choice can be defined as follows:

In option a, the byte-based I/O the input and output stream abstract class is used, that's why it correct. In option c, It is used to provide additional functionality, that's why it correct.   In option d, It is used to provide the text output.

How I to turn this ''loop while'' in ''loop for''? var i = 0; while (i < 20) { var lineY = 20 + (i * 20); line(0, lineY, 400, lineY); i++; }

Answers

Answer:

for(i = 0; i<20;i++){

lineY = 20 + (i * 20);

line(0, lineY, 400, lineY) }

Explanation:

First declare and initialize the variable i. You have not specified the data type of i so if the data type of i is integer i.e. int then you should declare i variable in the for loop as for(int i = 0; i<20;i++)

So the given while loop has a variable i which is initialized to 0. Then while(i<20) means that while loop executes until the value of i exceeds 20. If this while condition is true then the two statements inside its body will execute. The two statements are: lineY = 20 + (i * 20);

line(0, lineY, 400, lineY);

The value of i ins incremented after each iteration i.e. i++

So while loop has the following syntax"

1) initialization;  ---->  i = 0

2) while(condition) {  ----> i<20

3) loop body ----->  lineY = 20 + (i * 20); line(0, lineY, 400, lineY);

4) increment or decrement loop variable  } ----> i++

For loop has the following syntax:

for( initialization of loop variable ; condition; decrement/increment loop variable)  {

loop body }

Here:

initialization  ---->  i = 0

condition        ----> i<20

loop body     -----> lineY = 20 + (i * 20); line(0, lineY, 400, lineY);

increment or decrement loop variable  ---->  i++

Unspecified a. typical IPv6 prefix used to indicate the network portion of the address. /64 b. IPv6 address represented as ::/128 (compressed form) and cannot be assigned to an interface Unique local c. Unique, internet-routable IPv6 address (dynamic or static) Loopback d. Used to communicate with other devices only on the same IPv6 subnet.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given statements there are some mistype errors so, in the explanation section, we define the question with their suitable answer.

In choice A:

The Internet Protocol version 6 (IPv6) Prefix Length is being used to identify however many bits are already in the network part of its Global Unicast IPv6 address. It uses the number 64 for employed to recognize the network part of the very first 64 bits, that's why in Option A answer is "/64".

In choice B:

An IP address is used to represent 8 classes, in which each representing 16 bits, in the representation IP address it uses:: that is unspecified, that's why in Option B answer is "Unspecified".

In choice C:

The global unicast is a single connection on each sender and receiver, it specified from each network address, through one position upon its network to the other, that's why in Option C answer is "global unicast".

In choice D:

The link-local is used to communicate with other devices with the same IPv6 subnet, that's why in Option D answer is "link-local".

Please find the attachment of the question:

A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements?

Answers

The options available are:

Search, modify.

StartTLS, delete.

Bind, modify.

Bind, add.

Answer:

StartTLS, delete

Explanation:

StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.

On the other hand, the DELETE operation can make a change to a directory object.

According to the given question, the common operations that supports requirements where directory needs to be able to make changes to directory objects securely are;

Bind, addSearch, modifyBind, modifyStartTLS, delet

According to the question, we are to discuss the common operations that supports some requirements as regards the changing of directory objects securely.

As a result of this we can see that making use of  StartTLS, delete can serve this purpose and other function as well.

Therefore, common operations that supports requirements where directory needs to be able to make changes to directory objects securely is Search and modify.

Learn more about directory architecture at:

https://brainly.com/question/13171394

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

what is a good electric fan for your room?​

Answers

Answer:  a box fan

Explanation:

the get you really cold easily and its easy to turn off and on

The ___________ button represents the start of a hyperlink in Table of contents.

Answers

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).

Write the steps to create labels in OpenOffice writer

Answers

1. Start up Open Office.Org.

2. Click on File >> New >> Labels.

3. In the label dialog box, click on the brand box. This will allow you to choose the type of paper that you use.

4. Select the type of document that you want. The usual standard is Avery, but feel free to explore and discover what you like.

5. Select if you want a single label, a document, and any other options. Some of the things you might want to do are:

- Create a variety of labels for folders or drawers

- Create a sheet of address labels

-  Create decorative labels

6. Click New Document. Here, you see a sheet of blank labels.

7. Create the type of format/placement that you want for your labels. Once you are happy with it, copy it to the rest of the labels.

8. Fill your labels with necessary information.

9. Print them out.

A 1kg block is being pushed against a wall by a force F = 75 N as shown. The coefficient of friction is

0.25. The magnitude of acceleration of the block is​

Answers

Answer:

37deg

Explanation:

Answer:

37n

Explanation:

A string array:
A. Stores an actual string in each of its elements.
B. Can only provide access to strings of a certain length.
C. Is actually an array of pointers.
D. Is always less memory efficient than an equivalent double-subscripted array.

Answers

Answer:

C :Is actually an array of pointers

Explanation:

Here, we want to choose which of the options fit best as the answer to the question.

The correct answer here is that the string array is an array of pointers

A string array is used to store string of characters. The term array is an indication of the fact that it is a collection

Other Questions
plz help me with thisplz answer correctly.will give the brainliest!!urgent!!! How did shoemaking change during the Gilded Age?In 1800, shoes were made by hand. In 1900, shoes were being mass-produced in factories.In 1800, shoes were mass-produced in factories. In 1900, shoes were still made in factories.In 1800, shoes were made by hand. In 1900, shoes were still made by hand.In 1800, shoes were mass-produced in factories. In 1900, shoes were made by hand A corporation has 50,000 shares of $25 par stock outstanding. If the corporation issues a 3-for-1 stock split, the number of shares outstanding after the split will be a.50,000 shares b.100,000 shares c.150,000 shares d.16,666 shares dandre expands 120w of power in moving a couch 15 meters in 5 seconds how much force does he exert ? Bendel Incorporated has an operating leverage of 7.3. If the company's sales volume increases by 3%, its net operating income should increase by about: Why do hurricanes lose strength once they reach the land?O A. Hurricanes can't replenish their water from the ground.B. Hurricanes gain strength from the warmth of the ocean water.C. Hurricanes lose strength when they reach a warm front on land.D. Friction with the ground stops hurricane spinning. Micah solves a linear equation and concludes that x = 0 is the solution. His work is shown below. (1 3x) = 4( + 2) 4 lines of math. The first line is, StartFraction 5 Over 6 EndFraction left-parenthesis 1 minus 3 x right-parenthesis equals 4 left-parenthesis negative StartFraction 5 x Over EndFraction plus 2 right-parenthesis. The second line is, StartFraction 5 Over 6 EndFraction minus StartFraction 5x Over 2 EndFraction equals StartFraction 5x Over 2 EndFraction plus 8. The third line in plus StartFraction 5x Over 2 EndFraction and StartFraction 5x Over 2 EndFraction on both sides of the equal sign. The fourth line is 0 equals x. 0 = x CheckWhich expressions are a sum or difference of cubes? Sort each expression into the correct category.64x3 - 216Sum or Difference of CubesNot a Sum or Difference of Cubes8x9 +27x3 + 12536x3 - 121x6 - 16 PLEASE HELP! Manufacturers often alter different packages to save money and to grab customers attention. Explain using an example, how changes in the dimensions of common geometric shapes will affect the volume of the following shapes: prisms, cylinders, cones and spheres. Find the measure of d. what was the reason for the hundred years war Dairy Farm enters into a contract with EZ Serve Ice Cream Company to supply milk. Later, Dairy decides that it is no longer advantageous to fulfill the contract and subsequently fails to perform as promised. EZ files a suit against Dairy. A breach of contract occurred when:_________ A) Dairy entered into a contract with EZ. B) Dairy decided that it was not advantageous to fulfill the contract. C) Dairy failed to perform the acts promised in the contract. D) EZ filed a suit against Dairy. Joe enters into a contract with Harry only because of Harry's threats. Later, Joe refuses to perform, claiming that he entered into the contract under duress. Harry sues to enforce the contract. To be found guilty of duress, Harry must have threatened a. Joe with a wrongful act. b. Joe with an illegal act. c. Joe with deadly force. d. to file a civil suit against Joe. e. either A or B. 30 POINTS!!!Suppose f(x) = x2 and g(x) = (1/3)^2. Which statement best compares the graph of g(x) with the graph of f(x)?Image attached Please help!!! You are reading a food label. Arrange the steps in the order you should perform them. 1) Check how many servings there are in one package of food. 2) Assess the nutrient values such as fat, saturated fat, dietary fiber, vitamins, and minerals. 3) Look at the Percent DV to assess if particular nutrients are low, moderate, or high. 4) Look at the serving size. Find the correct algebraic representation of the rotation shown below.a. (y, -x)b. (-x, -y)c. (-y, x)d. (y, x) All of the following are ways emergency communications differ from routine communications EXCEPT: A. The timeliness of emergency messages is critical to protecting safety and dispelling rumors. B. Stress, change of routine, and lack of sleep can make it more difficult for people to hear messages during an emergency. C. Emergency messages are intended to elicit a timely response from the public. D. Emergency communications are designed to raise awareness and provide knowledge rather than provoke a desired response. The organizer of the first unit of Buffalo Soldiers wasa) Nathan Bedford Forrestb) Ulysses S Grantc) Robert E. Leed) Phillip Sheridan 8/7=x/5 what is the value of x round to the nearest tenth Abigail's grandmother is getting very forgetful, and her family is worried that she isn't telling the doctor all of her symptoms and discomforts when she goes to an appointment. How can Abigail and her family best advocate for her grandmother so she maintains her health?