1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
3 years ago
11

What are types of computer viruses

Computers and Technology
2 answers:
NemiM [27]3 years ago
6 0

Answer:

Resident Virus. Resident viruses set up shop in your RAM and meddle with your system operations. ...

Multipartite Virus. This virus infects the entire system. ...

Direct Action. ...

Browser Hijacker. ...

Overwrite Virus. ...

Web Scripting Virus. ...

File Infector. ...

Network Virus

Explanation:

Taya2010 [7]3 years ago
5 0

Answer:

1. RESIDENT VIRUS

2. MULTIPARTITE VIRUS

3. DIRECT ACTION

4. BROWSER HIJACKER

5. OVERWRITE VIRUS

6. WEB SCRIPTING VIRUS

7. FILE INFECTOR

8. NETWORK VIRUS

9. BOOT SECTOR VIRUS

Explanation:

1. RESIDENT VIRUS

They usually target your RAM in your computer and are hard to detect.

2. MULTIPARTITE VIRUS

The virus infects your entire operating system. It spreads by performing unauthorized actions.

3. DIRECT ACTION

This virus targets specific executable files (.exe) and when opened starts to infect your computer. It replicates and infects files.

4. BROWSER HIJACKER

This virus is easily detected, and directs your web browser towards the virus.

5. OVERWRITE VIRUS

These viruses overwrite files to gain control over your system.

6. WEB SCRIPTING VIRUS

When you download malicious software, the virus can infect your computer. It can also be found in shady links on websites and such.

7. FILE INFECTOR

By targeting executable files (.exe), file infector viruses slow down programs and damage system files when a user runs them.

8. NETWORK VIRUS

Network viruses travel through network connections and replicate themselves through shared resources.

9. BOOT SECTOR VIRUS

Using a USB drive, when you plug it in, the virus goes into the system and infect the master boot record.

You might be interested in
FOR DIGITAL DESIGN/ PHOTOGRAPHY
zysi [14]

Answer:

Its D DLSR and Mirrorless

Explanation:

Tell me if you get it wrong or right :3

6 0
3 years ago
Read 2 more answers
Direct messaging is similar to email, except
fredd [130]
No personal web..............
6 0
3 years ago
Read 2 more answers
What is the difference between an html opening tag and a closing tag?.
Doss [256]

Answer:

Explanation:

Generally speaking, there are two kinds of tags - opening tags: <html> and closing tags: </html>. The only difference between an opening tag and a closing tag is the forward slash "/". You label content by putting it between an opening tag and a closing tag.

HTML is all about elements.

7 0
2 years ago
List 5 ways by which Artificial intelligence (AI) can be used to drive our business.​
andreyandreev [35.5K]

Answer:

start a website

Explanation:

true

5 0
3 years ago
Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities. Which
Flauer [41]

The subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

<h3>What is SRS document?</h3>

SRS document of the software requirement specification document is the document which describes the function of a software and its procedure to perform a particular function.

Different types of requirement-

  • A. External Interface Requirements- This includes the interface of used, such as layout of screen, button etc.
  • B. Design Constraints- This includes the subcomponent of the system, such as performance requirement.
  • C. Inverse Requirements- It defines that what a system can not do.
  • D. Logical Database Requirements- Data of the user are saved in this such as profile, massage,data formats, data integrity, and storage capabilities etc.
  • E. Non-Functional Requirements-This includes attributes of system, performance, security etc.

Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities.

Thus, the subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

Learn more about the SRS document here:

brainly.com/question/26161636

#SPJ1

4 0
3 years ago
Other questions:
  • In your own words, explain the role of scientific investigation in the development of the Theory of Evolution.
    6·1 answer
  • When is the bond between the actin and myosin head is broken? when an ATP molecule binds to the myosin head when an ATP molecule
    6·1 answer
  • What was the impact of the rise of the Japanese auto industry and the semiconductor industry in south eastern​ Asia? A. It incre
    13·1 answer
  • What is your favourite video game??​
    5·2 answers
  • Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are
    5·1 answer
  • Describe how to find and replace a text in a document​
    13·1 answer
  • Jonathan is in the process of creating a photo of a fluttering flag with cars moving around in the background. He wants the flag
    13·2 answers
  • Discuss the impact printer and its types in detail?
    7·1 answer
  • Give an example of what Artificial Intelligence application most popular is used on a daily basis.
    12·2 answers
  • Why are salaried employees often excluded from overtime pay
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!