1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
5

Which is the best description of a computer virus?

Computers and Technology
2 answers:
solniwko [45]3 years ago
8 0

Answer:

a program that can damage a computer

Explanation:

MatroZZZ [7]3 years ago
6 0
The best description of a computer virus is. Someone first starts out making a malicious program, then can send it to a unexpected user. After that, when the user opens the malicious program, it can do negative things on the target. The virus first starts out in the system32, then infects a random file type for example, exe files, or dlls etc. Then random errors can pop up on the computer saying "YOUR COMPUTER IS UNDER RISK! CALL THIS NUMBER NOW! 555-555-5555" and the options of the error, can direct you to a website, that can give you another virus. To get rid of a virus, you have to ignore the popups that comes onto your computer, and get a strong antivirus like avast, or avg. Then let it scan the system. After when the scan is done, it will show up the virus, and it will give you options "to delete virus or ignore it" you would hit delete. I hope this answer helped you. Let me know if you have any more questions! Thanks!
You might be interested in
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
2 years ago
WHAT ARE THE CONTENTS THAT WE SHOULD USE FOR THE PRESENTATION OF DIGITAL WORLD
Lana71 [14]

Answer:

Introduction

Importance

Advantages

Disadvantages

Effects

Conclusion

8 0
3 years ago
Which of these is NOT an example of a programming language?
777dan777 [17]
High level sorry if im wrong
7 0
4 years ago
Read 2 more answers
What do the stapedius and gluteus maximus have in common?<br> this is a science question
jenyasd209 [6]

Answer:

What do the stapedius and gluteus maximus have in common? They move the hips and thighs. They are attached to bones. They are the largest muscles.

Explanation:

5 0
4 years ago
Read 2 more answers
Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and s
Akimi4 [234]

Answer: (a) Target had security software, but the notification alerts from the software were  ignored.

Explanation:

The security software was there in target but its notification alerts being ignored was something which was not thought to have been occurred during the Target security breach, as anyone could be alerted with the notification alert.

6 0
3 years ago
Other questions:
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • 12. Which of the following is a complex formula?
    13·2 answers
  • What does SMTP stand for?
    6·2 answers
  • What is the drawback of the linear model?
    5·2 answers
  • _______________ is the term for the convergence of real-time and non-real-time communications services such as telephony, instan
    11·1 answer
  • Print 'userNum1 is negative" if userNum1 is less than 0. End with newline Convert userNum2 to 0 if userNum2 is greater than 9. O
    8·1 answer
  • 1. What runs horizontally and is identified with numbers?
    12·2 answers
  • What will be result of below if statement.
    13·1 answer
  • Identify the selector in the following CSS code:
    10·1 answer
  • "If possible, always bring print-outs of your slides for your audience
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!