1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
13

75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro

und the globe. Create a timeline of these viruses, and discuss how each of them worked and spread.
Computers and Technology
1 answer:
Alika [10]3 years ago
8 0

Answer:

Y2K - Y2K is a type of macro virus that targets those files that are created using programs such as Word, Excel, etc. Discovered - 1991

CMJ - These viruses install themselves as a part of the operating system.

Trivial.88.D - This is also a type of File infector virus that attacks a file and deletes the information it may contain.

Vienna virus - Is a type of Direct Action Viruses that can be found in the root directory of a hard disk.

Brain Virus - It is a Boot Infector Virus that often attack the master boot record of a hard disk.

Sweeper - It is a malware designed to appear as an anti-virus program. It's also known as 'Rouge'.

Trojan Horse - It imitates the appearance of a regular software and it attacks the computer system by deleting and sometimes re-creating the system files.

Spyware - It is a type of malware that operates to infringe upon the user's privacy.

Worms - It is a malicious program that replicate themselves from one system to another, through a network like worms.

Hope it helps :)

You might be interested in
Patrick manages the cloud services that are used by a small hospital system. He knows that there are a lot of laws and regulatio
svet-max [94.6K]

Answer:

a. HIPAA

Explanation:

HIPPA represents the Health Insurance Portability and Accountability Act that of the United States which becomes mandatory for protecting the medical data in any form.

Also in the case of data protection that represent the general regulations, PCI DSS, GDPR etc would be used

So the option a is correct

hence, all the other options are wrong

8 0
3 years ago
152<br>what is the role of Computer as<br>transforming agent in the<br>Information society.​
hichkok12 [17]
I have a question what grade are you in
8 0
3 years ago
A loop within another loop is known as a(n) ____ loop.
Natali [406]
Nested






..................................
4 0
3 years ago
How do you change the desktop background in the macos mojave operating system?
sleet_krkn [62]

Answer: Click the System Preferences icon on the dock. In the first row, click Desktop & Screen Saver.

Explanation: When it comes to macOS versions, Mojave and High Sierra are very comparable. The two have a lot in common, unlike Mojave and the more recent Catalina.

8 0
1 year ago
Write the definition of a function minMax that has five parameters. The first three parameters are integers. The last two are se
guapka [62]

void minMax(int a, int b, int c, int*big, int*small)

{

if(a>b && a >c){

*big = a;

if(b>c)

*small = c;

else

*small = b;

}

else if (b>a && b>c){

*big = b;

if(a>c)

*small = c;

else

*small = a;

}

else{

*big = c;

if(a>b)

*small = b;

else

*small = a;

}

}

8 0
2 years ago
Other questions:
  • What port does rdp use by default and from what range of numbers should you select a private port number?
    15·1 answer
  • What makes us see continuously moving images when still images appear in rapid succession
    11·1 answer
  • Help Asap! Marking brainliest!✨
    15·2 answers
  • Two categories of payroll deductions are required deductions and ___ deductions.
    9·2 answers
  • Suppose testcircle1 and circle1 in listing 9.1 are in two separate files named testcircle1.java and circle1.java, respectively.
    14·1 answer
  • X = 1 if (A = 1 OR B = 1) OR (A = 0 AND B = 1
    7·1 answer
  • Ew<br>subject: Computer<br>11101÷101<br> binary operations<br>​
    7·1 answer
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    12·1 answer
  • Often, a single source does not contain the data needed to draw a conclusion. It may be necessary to combine data from a variety
    9·1 answer
  • Imagine that you work for an organization that has no Internet use policy. Employees use the Internet in whatever way they want
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!