<u>The possible consequences of intentional virus setting:</u>
Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other to different process such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop and tablet.
To avoid or protect the computer there are two type of antivirus.
- On desktop or tablet or laptop. (It is called resident firewall).
- Internet gateway. (It is called firewall)
So company create virus and to rectify they make money of that process.
To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.
The condition known as <u>overflow</u> occurs when you try to store an integer that is bigger than the maximum allowed by the number of bits you have.
<h3>What is a buffer?</h3>
In Computer science, a buffer can be defined as a temporary area set aside on a computer system for the storage of data. This ultimately implies that, a buffer reside in the random access memory (RAM) of a computer system.
In the event that a computer system process or software program places more data (much more than what was originally intended to be allocated for data storage) in a buffer, the extra data overflows.
In this context, we can infer and logically deduce that when a value is assigned to an integer that is too big or large for the computer to represent, it is a condition referred to as an overflow.
Read more on overflow here: brainly.com/question/26143242
#SPJ1
A bar code is a series of bars and spaces representing numbers or letters.
<h3><u>
Explanation:</u></h3>
A method that is used for the purpose of representing a data in the form of a picture or image that can be easily understood by the machine. It consists of many lines that has different widths and spaces. They either represent the letter or a number. These are mainly used for the representation of data in the machine understandable format.
For example an UPC-A bar codes has 12 numbers. The numbering system is represented by the first digit. The manufacturer will be represented by the next five digits in it. The product will be represented by the five digits following it. Check digit is represented in the last digit.
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>
- Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
- Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.
Thus the response above is correct.
Learn more about software attacks here:
brainly.com/question/25407509