Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Answer:
the answer is going to be printer
Answer:
scheduling
Explanation:
Scheduling- it is referred to as assigning a task to complete the goal or work on time. he works can include data flow, processing of data, etc.
There are two main types of scheduling
1) Preemptive process
2) Non- preemptive process
Preemptive process - in this process, priority is given to important tasks rather than less important tasks. the current task can be held for an important task
Non-preemptive process - It is referred to that process when the predefined schedule follows. In this process, next task executed only when current task finish
Numeric data because it consist of numbers