1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harina [27]
4 years ago
12

What is the strongest computer virus ever and how do u make it

Computers and Technology
1 answer:
nirvana33 [79]4 years ago
3 0

Answer:

I love you was the strongest computer virus.

Explanation:

Now to make it I mean not hard when it comes to when it was a vbs file and you can simply right click it and edit with notepad or some other text editor.

Ok to make it just make something like a bat file that will email everyone in your email outlook and it sends a other file that does the same as this script but it does other stuff to the computer.

And I love would not work today due to the main reason it was a big deal was ppl thought it was a text file. They would see the .TXT and the VBS at the end. There are worse then I love you .I had seen was Chernobyl witch would fry your bios. It's a hard answer but I love you did like over 8.7 billion in costs of damage so I love you is up there

You might be interested in
1. It is a requirement to install a routing protocol that monitors the network for routers that have changed their link state. T
Nady [450]

Answer:

1. Open Shortest Path First (OSPF)

2. Border Gateway Protocol (BGP)

3. Routing and Remote Access Service (RRAS)

4. Frame relay

5. Synchronous

6. Virtual

7. Committed Information Rate (CIR)

8. Integrated Services Digital Network (ISDN)

9. Asynchronous Transfer Mode (ATM)

10. Basic Rate Interface (BRI).

8 0
4 years ago
Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
Rudiy27

Answer:

All of this above.

Explanation:

All the mentioned practices can be use to prevent breaches.

6 0
3 years ago
Does anybody know how to private message on Brainly?
Brut [27]
You need to get a certain amount of questions
3 0
4 years ago
Read 2 more answers
The data table provides the results of several what-if analyses, but results are often clearer if you include a(n
r-ruslan [8.4K]
CVP Chart.
Source: "New Perspectives on Microsoft Excel 2010: Comprehensive" by June Parsons, Dan Oja, Roy Ageloff, Patrick Carey.
4 0
3 years ago
How do you optimize a website using JavaScript?
GenaCL600 [577]
You can edit the website (using Wordpress) -if it is your website of course-, and code JavaScript commands into the page that’s going to be uploaded.

Check out my website: www.birdbloggersblog.com

I coded that with HTML.
4 0
3 years ago
Other questions:
  • A network technician is setting up a wireless access point in the front office of a small company. The technician needs to disab
    14·1 answer
  • ¿Es especial que mi cumpleaños sea el día de San Valentín?<br><br> si o no
    11·2 answers
  • Refer to the following code segment. You may assume that array arr1 contains elements arr1[0],arr[1],...,arr[N-1], where N = arr
    8·1 answer
  • What does a wholesaler do?
    12·1 answer
  • To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
    10·1 answer
  • How is the bootstrap program started?
    6·2 answers
  • Which of the following is an example of data an Earth-observing satellite would collect?
    7·1 answer
  • How many people in the world
    14·1 answer
  • Write an algorithm (in pseudocode) for the following Scenario.
    7·1 answer
  • I need the answer asap !!!!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!