Answer:
Split Infection
Explanation:
In the split infection technique, each time the file is opened either by the user or the system operating system, the virus copy itself into another file on the same system and unload malicious payloads to perform some actions. While this is ongoing, the virus erase file from the user hard drive and might even go as formatting the hard disk drive.
It should be noted that the virus cannot transfer itself from one computer to another
I think it is 3 no? Maybe I dunno but I am confident
Answer:
Tags can be identified as they are written as <tagname> Something </tagname>
<tagname> this tag is called start tag.
</tagname> this tag is called as end tag.
for ex:<p> This is a paragraph </p>
There are some elements with no end tag.for ex:- <br> tag.
Attributes are used to provide additional information to an HTML element.
Every element can have attributes.
for Ex:- <h1 style="background-color:red";>MY WEBSITE </h1>
So the background of h1 will become red.
Answer:
The correct answer to the following question will be Option C (Volatile type of memory).
Explanation:
Random Access Memory, a variety of computer's memory which could be retrieved accidentally i.e., some memory can be obtained without any of the previous bytes being touched.
- Volatile memory is a type of a storage in computer that only retains its information or data while powering the appliance.
- Almost all of the RAM used in Pc's for the primary storage is unstable storage.
So, Option C is the right answer.