1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
13

75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro

und the globe. Create a timeline of these viruses, and discuss how each of them worked and spread.
Computers and Technology
1 answer:
Alika [10]3 years ago
8 0

Answer:

Y2K - Y2K is a type of macro virus that targets those files that are created using programs such as Word, Excel, etc. Discovered - 1991

CMJ - These viruses install themselves as a part of the operating system.

Trivial.88.D - This is also a type of File infector virus that attacks a file and deletes the information it may contain.

Vienna virus - Is a type of Direct Action Viruses that can be found in the root directory of a hard disk.

Brain Virus - It is a Boot Infector Virus that often attack the master boot record of a hard disk.

Sweeper - It is a malware designed to appear as an anti-virus program. It's also known as 'Rouge'.

Trojan Horse - It imitates the appearance of a regular software and it attacks the computer system by deleting and sometimes re-creating the system files.

Spyware - It is a type of malware that operates to infringe upon the user's privacy.

Worms - It is a malicious program that replicate themselves from one system to another, through a network like worms.

Hope it helps :)

You might be interested in
Assume that name has been declared suitably for storing names (like "amy" , "fritz" and "moustafa") write some code that reads a
tamaranim1 [39]
Name = "Bob"
# or you can prompt the user to enter their name:
# name = input("What's your name? ")

print("greetings," , name)
3 0
4 years ago
What do u call a individual that loves motor bikes and leather and is in a rival group known as mods?
vladimir1956 [14]
My best guess would be a biker they love motor bike they wear leather jackets and ride in groups this is the only thing i could think of

~ thanks ~
7 0
3 years ago
Identify tags and attributes in HTML 5
Vaselesa [24]

Answer:

Tags can be identified as they are written as <tagname> Something </tagname>

<tagname> this tag is called start tag.

</tagname> this tag is called as end tag.

for ex:<p> This is a paragraph </p>

There are some elements with no end tag.for ex:- <br> tag.

Attributes are used to provide additional information to an HTML element.

Every element can have attributes.

for Ex:- <h1 style="background-color:red";>MY WEBSITE </h1>

So the background of h1 will become red.

7 0
3 years ago
The area of the spreadsheet highlighted in red is the _____.
iragen [17]

A spreadsheet is a software application which is used to display numerical data in a tabular form. It has <em>further functions</em> which includes organizing, displaying, calculating data, etc where the data can be viewed at a glance and retrieved from memory.

There are <em>different types</em> of spreadsheet which includes:

  • <u>G00gle Sheet</u>
  • <u>Microsoft Excel</u>
  • <u>LibreOffice</u>
  • <u>Smartsheet,</u> etc.

Data can be arranged in rows and columns.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more here:

brainly.com/question/22101774

5 0
2 years ago
Linda is the owner of Souvenirstop, a chain of souvenir shops. One of the shops is located at the City Centre Mall. Though the s
Klio2033 [76]

Answer:

attraction and attention

6 0
3 years ago
Other questions:
  • What is the slogan of the sociological school of criticism ?​
    9·1 answer
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
    9·1 answer
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • A hacker scanning a web server is likely to be identified by the target's web a. Because of the FBI's Carnivore scanning program
    12·1 answer
  • 17. When an industrial electrical circuit requires a 220 VAC single phase power supply, the electric power supply circuit is nor
    7·1 answer
  • How has technology impacted our lives and the world we live in? In your own words.
    9·1 answer
  • What will the "background-color" of the "topButton" be when the program is finished running?
    10·1 answer
  • I need help NOW with my java script!! 1. What will the code below output to the console and why? const person = {
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!