1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
13

75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro

und the globe. Create a timeline of these viruses, and discuss how each of them worked and spread.
Computers and Technology
1 answer:
Alika [10]3 years ago
8 0

Answer:

Y2K - Y2K is a type of macro virus that targets those files that are created using programs such as Word, Excel, etc. Discovered - 1991

CMJ - These viruses install themselves as a part of the operating system.

Trivial.88.D - This is also a type of File infector virus that attacks a file and deletes the information it may contain.

Vienna virus - Is a type of Direct Action Viruses that can be found in the root directory of a hard disk.

Brain Virus - It is a Boot Infector Virus that often attack the master boot record of a hard disk.

Sweeper - It is a malware designed to appear as an anti-virus program. It's also known as 'Rouge'.

Trojan Horse - It imitates the appearance of a regular software and it attacks the computer system by deleting and sometimes re-creating the system files.

Spyware - It is a type of malware that operates to infringe upon the user's privacy.

Worms - It is a malicious program that replicate themselves from one system to another, through a network like worms.

Hope it helps :)

You might be interested in
Given variables first and last, each of which is associated with a str, representing a first and a last name, respectively. Writ
valentina_108 [34]

Answer:

The python code is attached

Explanation:

  1. I defined a function called Fullname
  2. The function accepts 2 parameters first and last
  3. last[0] gives the first letter of the last variable
  4. last[0].upper() modifies the first letter as upper letter
  5. same applied to variable first
  6. + sign concatenates strings and variables to the variable name
  7. the function returns the variable name

5 0
3 years ago
2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
Andreas93 [3]
—-_-__-____- _—-_- -__-_-____-__




___-_-_ _- —|
4 0
2 years ago
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
3 years ago
You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command
masya89 [10]

Answer:

su ,sg and sudo command.

Explanation:

Whenever the user needs to enable workgroup mates should use fdisk including just that disk on both the /dev / sda disk, using the following command to update and configure the following packages. Thus he uses the command su, sg, and sudo.

So, the following commands are required according to the following statement.

6 0
3 years ago
Which careers use web browsers
oksano4ka [1.4K]
All of the above. If that’s not an option if it’s multiple choice let me know. Everyone uses web browser/the internet no matter the career.
5 0
3 years ago
Other questions:
  • Vpns create a _____________ to transport information through public communications media.
    8·1 answer
  • _____ refer(s) to computer programs that provide instructions for a computer to execute a desired task. Answer .a.Software .b. I
    7·1 answer
  • What does the do not disturb button do on the iphone?
    12·1 answer
  • The _______ contains the most commonly used commands.
    6·2 answers
  • Steps to log out of an email account ​
    5·2 answers
  • Which type of error is a random error
    13·2 answers
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer
    14·1 answer
  • What does Al stand for?
    10·1 answer
  • Kenny FRIEND ME. Ps that is my brother
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!