1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
4 years ago
6

What is the oldest malware victor

Computers and Technology
1 answer:
arsen [322]4 years ago
7 0

Answer:

The oldest malware vector was emails.

Explanation:

Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.

You might be interested in
What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out ano
Afina-wow [57]

Answer: Port mirroring

Explanation: Port mirroring is the process through which the network packets are copied and transmitted port to port device as an input. It can carry the data in the form of network packets and then switch by coping the sending the data. This technique is implemented on the switches,computers and other networking devices for the monitoring and analysis process.

5 0
3 years ago
What does the bit pattern 01000000 represent?
kondaur [170]
The binary bit pattern 01000000 represent in decimal is 64.

8 0
3 years ago
If your tired but still need to proofread your document,what should you do?
madreJ [45]

Answer:

If i were to choose one i would, come back to it later. But the best thing to do is have somebody else proofread your essay, doc, or anything else, because its the best thing to have a second pair of eyes so they can suggest what you could fix or change or any opinions on your document. Not sure why you need this but i hope it helps <3

Have a great day <33 -Blazetoxic123

7 0
3 years ago
Read 2 more answers
The first row of a table is often called the _____ row.
satela [25.4K]

ANSWER:

The first row of a table is often called the header row.

~batmans wife

7 0
3 years ago
Read 2 more answers
The responsibilities of the IT department and the needs of the user departments may cause conflicts over A. the color of the use
monitta

I'd say B: the amount and type of security placed on an application.

This is a common problem that exists between IT and other user departments. The IT department is well known for closing up certain sites and applications needed by other departments all in the name of security. As a result, it might slow down operations within different department and may cause inefficiency.

4 0
4 years ago
Other questions:
  • ____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a netw
    12·1 answer
  • Which is a network of devices built around a person, typically within 10 meters of range?
    5·1 answer
  • How can ASCII be used to represent characters in a computer system?
    15·1 answer
  • In the following data definition, assume that List2 begins at offset 2000h. What is the offset of the third value (5)?
    10·1 answer
  • Which of the following best describes the protocol used on the internet?
    8·1 answer
  • My brainly has broke- XD
    11·1 answer
  • What is the value of numX when this program is executed? if 3 &lt; 5 and 8 != 3: numX = 3 else: numX = 7
    13·2 answers
  • How do hand tools,Farm implements and farm equipment differ from one another
    6·1 answer
  • 4. True or False: In order to use wi-fi signal/network, you have to remain seated in one spot.
    6·1 answer
  • X = 9 % 2<br><br> if (x == 1):<br>   print ("ONE")<br> else:<br>   print ("TWO")
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!