1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
12

In which way is a worm different from a virius

Computers and Technology
1 answer:
dangina [55]3 years ago
3 0
A worm as a multicell organism, but a virus is a single cell.
You might be interested in
Please fill these out. I really need this done.
tatyana61 [14]

Answer:

i can't see this

Explanation:

5 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD tele
Vadim26 [7]

Answer:

Explanation:

Different technologies use different user interface designs in order to make the user experience as easy and intuitive as possible. This varies drastically from one device to another because of the capabilities and size of each device. If we take a fitness/smart watch into consideration, this device does not use pop up menus or side scrolling menus but instead uses large full screen menus where each option nearly fills the entire screen. That is done because the smart watch screens are very small and making everything full screen makes reading and swiping through options that much easier for the user. If the user interface were the same as in a television or smartphone it would be impossible to navigate through the different options on such a tiny screen.

7 0
2 years ago
Explain about forensic tools?
Ganezh [65]

Answer:

 In the computer forensics, it basically examining the digital media by using the different types of specialist tools which is known as forensic tool.

It has the ability to acquiring the several evidence from the computer hard disk and by copying information, the data from the machine that can be procured and after that broke down for any data that is appropriate for the case.

There are different types of forensics tools that are:

  • SIFT (SANS Investigative Forensics Toolkit)
  • Volatility
  • Redline
  • Digitally forensics framework
  • COFEE

4 0
3 years ago
Which can be inserted using the insert panel in dreamweaver cc?
timofeeve [1]

Answer: Learn how to use the Insert panel in Dreamweaver to create and insert objects, such as tables, images, OAM files, and Bootstrap components. The Insert panel contains buttons for creating and inserting objects such as tables and images. The buttons are organized into categories.

3 0
3 years ago
Other questions:
  • What are the example of dedicated computers?
    5·1 answer
  • Which are factors that go into a project plan? choose four answers
    14·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • Devon would like to install a new hard drive on his computer. Because he does not have a SATA port available on his motherboard,
    7·1 answer
  • . Explain and demonstrate the functionality of timer devices in an embedded system[
    9·1 answer
  • Identify traits of entrepreneurs. Check all of the boxes that apply.
    11·1 answer
  • An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will
    10·1 answer
  • Whay is processing?Explain with an example.​
    9·2 answers
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Summary on how drones can help manage the environment
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!