1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
2 years ago
9

One of the original forms of viruses, is usually stored on some form of removable media. When the removable media is connected t

o a new machine and is used to boot the machine, the virus moves from the media into the host system. Newer versions do not need to be booted; they simply have to reside on the removable media, such as on a flash drive.
Computers and Technology
1 answer:
Paladinen [302]2 years ago
4 0

Answer:

Boot sector virus

Explanation:

A boot sector virus is a virus which functions is to infects the sector of the boot  of floppy disks of hard disks in which they use DOS commands to spread to other floppy disks and they tend to  either copies the master boot program to another part of the hard disk or try to overwrites it which is why they are said to always infect a computer when it boots up as well as when it accesses the infected floppy disk in the floppy drive. Although BOOT SECTOR VIRUS are difficult to remove because most antivirus programs cannot clean the MBR while the windows is running reason been that it takes bootable  antivirus disks to properly remove a boot sector virus.

Hence with BOOT SECTOR VIRUS newer versions do not need to be booted due to the fact that they often have to reside on the removable media, such as on a flash drive especially in a case when the Computer systems are typically infected by these viruses. 

You might be interested in
What is <br> central vision
ser-zykov [4K]
Look for it in the dictanory
7 0
3 years ago
Read 2 more answers
Adam would like to reduce the size of an image that he inserted into a document. He selects the image and chooses the Crop optio
Dmitrij [34]

Answer:

it allows users to trim the edges of the image,making the image smaller.

Explanation:

Cropping refers to removing unwanted parts of a graphic hence can facilitate to reducing the size

3 0
3 years ago
Read 2 more answers
(01.05 LC)
andriy [413]
The answer is input! because the input is what the user enters, the output is what comes out from that, and the text and value aren’t related to the user
7 0
3 years ago
Read 2 more answers
In cell G6, use the appropriate lookup and reference function to retrieve the rental rate from the named range RentalRates. The
lora16 [44]

=VLOOKUP($A6,RentalRates,2,0) is the lookup for this.

<u>Explanation:</u>

Utilize the LOOKUP capacity to look into an incentive in a one-section or one-push go, and recover an incentive from a similar situation in another segment or one-push go. The query work has two structures, vector and cluster. This article depicts the vector structure.

In computer science, a lookup table is a cluster that replaces run time calculation with a more straightforward exhibit ordering activity. The investment funds as far as handling time can be critical, since recovering an incentive from memory is regularly quicker than experiencing a "costly" calculation or information/yield activity.

5 0
2 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
AysviL [449]

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

<em>Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. </em>

3 0
3 years ago
Other questions:
  • An example of an email client is:<br> A.)Yahoo<br> B.)Gmail<br> C.)Outlook<br> D.)All of the Above
    9·1 answer
  • Discuss what they need to consider if they wish to use their devices when they are away from home?
    6·1 answer
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • At the aquarium Grandma Simpson hugged the dolphin is that passive or active sentence​?
    6·1 answer
  • Hard light is usually not good for filming. True False
    11·2 answers
  • Complete the second clause of the following Prolog program for member/2 where member(X, Y) checks whether X is an element (a mem
    7·1 answer
  • Beyond adding equations, what else does the Insert Equation feature allow users to do?
    7·1 answer
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class
    13·1 answer
  • Which of the following keywords allows a subclass to access a superclass method even when the subclass has overridden the superc
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!