1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
2 years ago
15

Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co

mputer virus outbreak in history, Mydoom caused estimated damage of $38 billion in 2004, but its inflation-adjusted cost is actually $52.2 billion. Make the last paragraph the conclusion. Also known as Novarg, this malware is technically a “worm,” spread by mass emailing. At one point, the Mydoom virus was responsible for 25% of all emails sent. Mydoom scraped addresses from infected machines, then sent copies of itself to those addresses. It also roped those infected machines into a web of computers called a botnet that performed distributed denial of service (DDoS) attacks. These attacks were intended to shut down a target website or server.
Computers and Technology
1 answer:
zheka24 [161]2 years ago
6 0

The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

<h3>What does MyDoom virus do?</h3>

The MyDoom virus was said to be the one that brought about a lot of loss in the whole globe.

The  MyDoom is known to be an effective worm that was created to make zombies out of lots of thousands of computers.

Note that the Hackers are able hijacked terminal to wage a kind of  denial of service (DoS) attack to any firm that they do identified.

The virus is known also as Novarg as it is a“worm,” sthat do pread by mass emailing.

Therefore, The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

Learn more about Virus from

brainly.com/question/14887682

#SPJ1

You might be interested in
A comma is also called a statement terminator. A. True B. False
aleksandrvk [35]

Answer:

The answer is False

Explanation:

A comma is also called a statement terminator. A. True B. False

The answer is False

Comma is used to separate individiual values or data types

variables.

A semi-colon (;) at end of a statement is called terminator.

8 0
3 years ago
Suppose the program counter (pc) is set to 0x2000 0000. is it possible to use the jump (j) mips assembly instruction to set the
lesya [120]
<span>With jump-YES. SInce we know that the instruction format of the jump instruction is 6 bits opcode and 26-bit jump address we can sufficiently encode the given address in the 26-bit space.</span>
7 0
4 years ago
What advantage does digital storytelling have over oral storytelling traditions?
Marysya12 [62]
Pretty sure the answer is D
6 0
4 years ago
Yooooooooooooooo
patriot [66]

Answer:

A-A Boolean search

Explanation:

8 0
3 years ago
Read 2 more answers
Describe how pseudocode makes programming more efficient for large programming tasks.
Talja [164]

Answer:Pseudocode helps us understand tasks in a language-agnostic manner. Is it best practice or suggested approach to have pseudocode creation as part of the development lifecycle? For instance:

Identify and split the coding tasks

Write pseudocode

Get it approved [by PL or TL]

Start Coding based on Pseudocode

Explanation: use phrasing tool if you want to write in your own words.

6 0
4 years ago
Read 2 more answers
Other questions:
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • ____________ is defined as the set of activities that revolve around a new software product, from its inception to when the prod
    11·1 answer
  • What are the cues that a website is safe to use for exchanging sensitive information?
    10·1 answer
  • A computer projecter is an example of a(n):<br> Input Device<br> Output Device<br> Storage Device
    12·2 answers
  • Every Java statement ends with: *<br><br> Period<br> Colon<br> Double quote<br> Semicolon
    11·2 answers
  • Which statement describes the Direction option for animations and transitions?
    5·2 answers
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    9·1 answer
  • How do I install another part on campaign call of duty cold war? please help.(best answer will get branliest.)
    15·2 answers
  • In your own words discuss 4 major strength and weakness<br> of<br> computer
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!