Answer:
A. mining all product reviews from an online store for further processing.
Explanation:
Answer:
Explanation:
actually you suck. nevermind.
Digital technology is the same as the used in digital watches, or the time display on a microwave oven. Digital is about using the exact numbers to tell the time. By being digital transmission of data became easy. Sound, images and document are relayed faster and stored conveniently through this system.
Answer:
Explanation:
A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
Like other types of malware, a virus is deployed by attackers to damage or take control of a computer. Its name comes from the method by which it infects its targets. A biological virus like HIV or the flu cannot reproduce on its own; it needs to hijack a cell to do that work for it, wreaking havoc on the infected organism in the process. Similarly, a computer virus isn't itself a standalone program. It's a code snippet that inserts itself into some other application. When that application runs, it executes the virus code, with results that range from the irritating to the disastrous.
Computer virus symptoms
How can you tell if a virus has slipped past your defenses? With some exceptions, like ransomware, viruses are not keen to alert you that they've compromised your computer. Just as a biological virus wants to keep its host alive so it can continue to use it as a vehicle to reproduce and spread, so too does a computer virus attempt to do its damage in the background while your computer still limps along. But there are ways to tell that you've been infected. Norton has a good list; symptoms include:
Unusually slow performance
Frequent crashes
Unknown or unfamiliar programs that start up when you turn on your computer
Mass emails being sent from your email account
Changes to your homepage or passwords
The already-long problem on hacking and other security-related cases necessitates for the application builders to check the data received from unknown sources. To further strengthen the security, even data received from known sources also need to be check as these may also contain harmful viruses creating critical problem to the application.