1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trapecia [35]
3 years ago
10

What are 7 good facts on Computer Viruses?

Computers and Technology
1 answer:
tia_tia [17]3 years ago
4 0
<u><em>Viruses,A tiny program that hacks a computer </em></u>
<u><em>Steals information and personal data.It can disable your laptop.Viruses can be found in malicious sites.Criminals share these viruses to steal data from others.With a firewall,Hackers will be detected.</em></u>
<u><em> </em></u>

<u><em>The general consensus is that there are no good viruses.</em></u>



You might be interested in
Which of the constraints listed below would be considered a physical constraint
timurjin [86]
Materials

materials are the only physical thing
8 0
3 years ago
Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.
Doss [256]
Jim is the main antagonist while Edward is the main protagonist of the movie.
8 0
2 years ago
When a user attempts to visit an internet-based web server, what is the default action of the windows firewall?
Kamila [148]
Google chrome and internet explore
7 0
3 years ago
The protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or tra
Sergeu [11.5K]

Answer: Information security

Explanation:

 The information security is one of the system that keeps the data confidential, assure the integrity and also availability of the information or data.

This system is basically refers as the CIA triad in the information security system and the data risk management.

The main aim of the information security is that keeps the data protected from the unauthorized accessing and also  controlling the access in the system.

Therefore, Information security is the correct answer.

8 0
3 years ago
Read the code below.
Rasek [7]

Answer:

theres an error on line one used python idle

Explanation:

8 0
4 years ago
Other questions:
  • Number Analysis Program: Write a program that reads data from the text file numbers.txt. Assume the file contains a series of nu
    14·1 answer
  • Consider that a large online company that provides a widely used search engine, social network, and/or news service is consideri
    12·1 answer
  • You are trying to troubleshoot a desktop power supply issue using a voltmeter. Which of the following options are the MOST commo
    6·1 answer
  • Kevin gets a call from a user who is trying to install a new piece of software. The user doesn’t have administrative rights, so
    10·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • How can I use HTML to express a personal value
    13·1 answer
  • Why the computer is known as versatile and diligent device ? explain.<br>​
    15·1 answer
  • Since the size of cache is always smaller than the size of the main memory, the sum of bits of the offset and index of a cache w
    14·1 answer
  • Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!