Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.
Answer:
Explanation:IPv4 is almost used up due to the constant increase in devices so therefore IPv6 was implemented to combat this issue, IPv6 uses 128 bit addresses, allowing 3.4 x 1038 unique IP addresses. This is equal to 340 trillion trillion trillion IP addresses. IPv6 is written in hexadecimal notation, separated into 8 groups of 16 bits by the colons, thus (8 x 16 = 128) bits in total. Which essentially means both me and you wont see IPv6 run out in our life times nor will you kids kids.
Answer: (A) Computer networks allow individuals to share many types of resources.
Explanation:
Computer network is basically known as digital telecommunication that allowing various nodes to sharing different types of resources in the network. In the computer network, the data link is establish over the cable like wire and optic media in the network.
The network basically allow sharing of the computing network and various types of resources in the networking.
It can allow sharing resources like printers, exchange files and CDs. There are mainly two types of networking that are: LAN and WAN.
Answer:
Sara: Personal data
Jorge : Personal data + official data.
Wanda: Personal data + students data
Carl: Personal data + official data
Explanation:
Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.
Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.
Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.
Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.
Answer:
False
Explanation:
Account of expenses, losses, gains, and incomes is called the Nominal account. Profit and Loss Account contains all indirect expenses and indirect incomes of the firm. Therefore, Profit and Loss Account is a Nominal Account and not a real account.
:)