1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
2 years ago
9

A computer virus is a program that can copy itself and infect a computer without the permission of the owner. How do you think a

computer virus compares to a real virus?
Computers and Technology
1 answer:
Ede4ka [16]2 years ago
3 0

Answer:

A virus is simply an infectious agent relatively small in size that multiplies only inside a host. The host can be a plant, an animal and even computer systems.

Whether it infects a system(computer) or a living organism, viruses potentially do the same thing - infect the target, and replicates itself inside the target.

Computer virus and an actual virus compare in the following ways:

i. They are both small compared to the host. Computer virus has a small size compared to the host software. Real virus has a small genome compared to the host genome.

ii. They spread. The virus in one computer can spread to other computers. In living things, the virus can spread also.

iii. Not quick to notice. When a system has been infected, it usually takes time before it becomes obvious. That might be because the virus is taking its time to replicate. The same thing applies to real virus. When a host is infected, it takes time before they notice.

iv. Harmfulness degree. Depending on the virus, the level of harmfulness varies in both a real virus and a computer virus.

There are other numerous ways in which they compare.

You might be interested in
#A year is considered a leap year if it abides by the #following rules: # # - Every 4th year IS a leap year, EXCEPT... # - Every
lara [203]

Answer:

To check if the year comes under each 100th year, lets check if the remainder when dividing with 100 is 0 or not.

Similarly check for 400th year and multiple 0f 4. The following C program describes the function.

#include<stdio.h>

#include<stdbool.h>

bool is_leap_year(int year);

void main()

{

int y;

bool b;

 

printf("Enter the year in yyyy format: e.g. 1999 \n");

scanf("%d", &y);     // taking the input year in yyyy format.

 

b= is_leap_year(y);  //calling the function and returning the output to b

if(b==true)

{

 printf("Thae given year is a leap year \n");

}

else

{

 printf("The given year is not a leap year \n");

}

}

bool is_leap_year(int year)

{

if(year%100==0)   //every 100th year

{

 if(year%400==0)   //every 400th year

 {

  return true;

 }

 else

 {

  return false;

 }

}

if(year%4==0)  //is a multiple of 4

{

 return true;

}

else

{

 return false;

}

}

Explanation:

Output is given as image

5 0
3 years ago
What does the headgear of a mine do
deff fn [24]
Hard to answer to short but I will try the head gear let's you talk to people on the internet
5 0
3 years ago
Read 2 more answers
Initially, later, and finally are examples of what kind of words
Klio2033 [76]
Im pretty sure that the correct answer is Transition words.
3 0
3 years ago
Which of the following processes allows animators to use computers to input human movement that can later be transformed to crea
nadya68 [22]
Motion Capture. "it's a combination of rotoscoping with newer computer technology, allowing people to use live footage as the basis for animation without having to go through the process of drawing over it." -scienceworld .ca
7 0
2 years ago
Read 2 more answers
Photographing during the midday can produce which of the following?
deff fn [24]
It can produce harsh shadows
5 0
2 years ago
Read 2 more answers
Other questions:
  • Default tab stops are set in Word every _______ inch.<br> a. ¾<br> b. 1<br> c. ½<br> d. ¼
    13·1 answer
  • If you delete an imessage does the other person see it
    12·1 answer
  • How many people employed in the United States work in a job related to digital media?
    12·1 answer
  • a) Before writing any code, you should go through a design process. Try to do so carefully – either follow a top-down approach,
    15·1 answer
  • How tp access to all tools in ms word
    10·1 answer
  • My friend has 200 subs and i have only 36 can you help me its ACYT ZR
    9·2 answers
  • Write a program that repeatedly reads in integers until a negative integer is read. The program keeps track of the largest integ
    9·1 answer
  • As you are discussing marketing with a client, you try to explain how individuals find sites. Which tool will you explain as the
    8·1 answer
  • What is an example of work performed by an integration platform as a service (ipaas)?
    14·2 answers
  • windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!