Answer:
Following are the answer to this question.
Explanation:
It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.
<u>The possible consequences of intentional virus setting:</u>
Virus is nothing but desktop or laptop or tablet OS has to do certain process as on its own which diverse other to different process such us stealing the data from desktop or laptop or tablet and making slow the performance of desktop and laptop and tablet.
To avoid or protect the computer there are two type of antivirus.
- On desktop or tablet or laptop. (It is called resident firewall).
- Internet gateway. (It is called firewall)
So company create virus and to rectify they make money of that process.
To protect our desktop or laptop or tablet from virus we are protected with law. In case due to virus attacked our laptop or desktop or tablet Is effected we can fine the or sent to jail by law.
Answer:
Explanation:
A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
Like other types of malware, a virus is deployed by attackers to damage or take control of a computer. Its name comes from the method by which it infects its targets. A biological virus like HIV or the flu cannot reproduce on its own; it needs to hijack a cell to do that work for it, wreaking havoc on the infected organism in the process. Similarly, a computer virus isn't itself a standalone program. It's a code snippet that inserts itself into some other application. When that application runs, it executes the virus code, with results that range from the irritating to the disastrous.
Computer virus symptoms
How can you tell if a virus has slipped past your defenses? With some exceptions, like ransomware, viruses are not keen to alert you that they've compromised your computer. Just as a biological virus wants to keep its host alive so it can continue to use it as a vehicle to reproduce and spread, so too does a computer virus attempt to do its damage in the background while your computer still limps along. But there are ways to tell that you've been infected. Norton has a good list; symptoms include:
Unusually slow performance
Frequent crashes
Unknown or unfamiliar programs that start up when you turn on your computer
Mass emails being sent from your email account
Changes to your homepage or passwords
Lydia used software to calculate the budget for each department. To create this budget, she used a spreadsheet.
Answer:
summarizing
Explanation:
when someone explains in their own words the main idea of a story, it is summarizing.