1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
9

One of the original forms of viruses, is usually stored on some form of removable media. When the removable media is connected t

o a new machine and is used to boot the machine, the virus moves from the media into the host system. Newer versions do not need to be booted; they simply have to reside on the removable media, such as on a flash drive.
Computers and Technology
1 answer:
Paladinen [302]3 years ago
4 0

Answer:

Boot sector virus

Explanation:

A boot sector virus is a virus which functions is to infects the sector of the boot  of floppy disks of hard disks in which they use DOS commands to spread to other floppy disks and they tend to  either copies the master boot program to another part of the hard disk or try to overwrites it which is why they are said to always infect a computer when it boots up as well as when it accesses the infected floppy disk in the floppy drive. Although BOOT SECTOR VIRUS are difficult to remove because most antivirus programs cannot clean the MBR while the windows is running reason been that it takes bootable  antivirus disks to properly remove a boot sector virus.

Hence with BOOT SECTOR VIRUS newer versions do not need to be booted due to the fact that they often have to reside on the removable media, such as on a flash drive especially in a case when the Computer systems are typically infected by these viruses. 

You might be interested in
Which programming language uses objects? C++ ALGOL Pascal BASIC
svetlana [45]

Answer:

C++

Explanation:

I am a c++ dev

7 0
3 years ago
Read 2 more answers
The number of colors available in a graphic is referred to as......what?
polet [3.4K]

<span>The number of colors available in a graphic is referred to as color depth. Color depth is also known as bit depth. It is the number of bits used to indicate the color of a single pixel, in a bitmapped image or video frame buffer or the number of bits used for each color component of single pixel.</span>

4 0
3 years ago
______ is the code that a user writes in order to create a document to display on the web
icang [17]

HTML(Hyper Text Markup Language) is the code that a user writes in order to create a document to display on the web.

Explanation:

HTML is a markup language used to create hyper texts that are platform-independent. Mark up feature can be linked to other web pages, e-mail, multimedia, documents, databases etc.

Tags are used in to identify each section like head, body, title, paragraphs, tables, images etc.

5 0
3 years ago
Q1) Convert the decimal number 67 to binary?​
Mashutka [201]

Answer:

1000011

Explanation:

4 0
3 years ago
Given a list of integers. find the size of the list
dlinn [17]

The size of a list of integers can be found using python as follows;

size = len(list1)

<h3>How to find the size of a list using python?</h3>

The size of a list can be found using the len() function in python.

According to the question, the list is an integer.

Therefore, let's use an example below:

list1 = [1, 2, 1, 3, 6, 7, 8, 9, 4, 7, 8, 6, 4]

size = len(list1)

print(size)

Therefore,  the size of a list of integers can be found using the len() function in python.

learn more on python here: brainly.com/question/14989942

#SPJ1

6 0
2 years ago
Other questions:
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • Which letters appear in the home row on a keyboard?
    11·1 answer
  • Which of the following is not a commodity?<br>A. Crude oil<br>B. Corn dogs<br>C. Cocoa<br>D. Coffee​
    10·2 answers
  • One random part of Chess is whether the white side or the black side moves first? A. True B. False
    10·2 answers
  • A(n) __________attack is designed to render the target unreachable by legitimate users, not to provide the attacker access to th
    8·1 answer
  • What does choosing Slide Sorter view do?
    8·1 answer
  • The command to get out of the loop.<br>a.<br>i exit<br>ii. break<br>iii. comment<br>iv. for​
    12·1 answer
  • Is a MODEM required for Internet Connectivity ?<br> Yes<br> No
    9·2 answers
  • 20 points!!
    7·1 answer
  • 8. The cell reference for a range of cells that starts in cell A1 and goes over to column G and down to row 10 is, a. A1-G10 b.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!