1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
4 years ago
8

List any four routes of transmission of computer virus. please give me answer​

Computers and Technology
1 answer:
JulijaS [17]4 years ago
5 0

Opening attachments or links from unknown or spoofed emails. note: shown above are two examples of how viruses can often appear as legitimate messages, but are designed to trick the computer user. ...

Downloading software from malicious sites. ...

Online Ads. ...

Social media. ...

Unpatched software.

follow me

You might be interested in
Anyone wanna teach me how to get better at Rocket League?
serg [7]

Answer:

yes its easy just follow my steps and u will be a MASTER at this game

1. you need lucky talismans for luck( trust me u need luck)

2. don't play like a begginer

3. or just don't make others believe you are a beginner, they have to see you as a BOSS to be afraid of you

4. and the last one and the most important u have to learn how to make a flip (ex:BackFlip, FrontFlip, LeftFlip< RightFlip) ez right NOO!! ITS NOT EASY

Now u are a MASTER at Rocket League so good bye little boy

4 0
3 years ago
Read 2 more answers
A heuristic is applied during a search process in hopes of producing a
tekilochka [14]
The answer that best completes the statement above is DEPTH-FIRST SEARCH. This is what is produced in the application of heuristic during a search process. When we say heuristic, this is the kind of approach done in order to discover something or to solve a particular problem. The Depth-First Search or also known as DFS, is a kind of algorithm that is used to analyze something by branching out ideas but in a backtracking manner.
3 0
3 years ago
The advantage of a digital camera in taking nighttime photographs is that you can see
stepan [7]

Answer:

Ima say true

Explanation:

7 0
3 years ago
Pat creates a table in a spread sheet
Anna11 [10]

Answer:

Explanation:

Details?

7 0
4 years ago
You want to view a list of users on a linux system. what command should you use?
vredina [299]
Answer is A: cat /use/passwd
7 0
2 years ago
Other questions:
  • How do you access the dark web? What are the negatives of doing this?
    14·1 answer
  • EVERYONE PLS JOIN MY GOOGLE CLASSROOM<br> CODE: clmvjbd
    13·2 answers
  • The objects that you place on master pages are called _____.
    6·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • How can you determine if the story is told in the third person
    5·1 answer
  • What is the full form of USB​ ?
    15·1 answer
  • Only the one dose audio editors and video editors know this
    9·2 answers
  • Braxton is writing a program to design t-shirts. Which of the following correctly sets an attribute for color?
    7·1 answer
  • What should you consider when using a wireless keyboard with your home computer
    15·1 answer
  • What is containment and why is it part of the planning process
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!