1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
13

75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro

und the globe. Create a timeline of these viruses, and discuss how each of them worked and spread.
Computers and Technology
1 answer:
Alika [10]3 years ago
8 0

Answer:

Y2K - Y2K is a type of macro virus that targets those files that are created using programs such as Word, Excel, etc. Discovered - 1991

CMJ - These viruses install themselves as a part of the operating system.

Trivial.88.D - This is also a type of File infector virus that attacks a file and deletes the information it may contain.

Vienna virus - Is a type of Direct Action Viruses that can be found in the root directory of a hard disk.

Brain Virus - It is a Boot Infector Virus that often attack the master boot record of a hard disk.

Sweeper - It is a malware designed to appear as an anti-virus program. It's also known as 'Rouge'.

Trojan Horse - It imitates the appearance of a regular software and it attacks the computer system by deleting and sometimes re-creating the system files.

Spyware - It is a type of malware that operates to infringe upon the user's privacy.

Worms - It is a malicious program that replicate themselves from one system to another, through a network like worms.

Hope it helps :)

You might be interested in
How does the use of blocking affect the external sorting algorithm, and how does it change the cost formula
nekit [7.7K]

Answer: the pythagros thereom of the networks cause it to be emotianally distressed and creates a tetrahadal lattice

Explanation:

this also then creates lands slides

3 0
2 years ago
What would be an ideal scenario for using edge computing solutions?
marissa [1.9K]

Answer:

The issue is explained in the explanatory paragraph underneath.

Explanation:

  • Throughout the case of inadequate internet connectivity besides IoT systems or because that's not particularly effective for IoT gadgets always to be linked towards the web, edge computing deployment itself is possible.
  • This could be utilized across covalently linked industries including financial institutions as well as production.

4 0
3 years ago
Write a function called ReverseLetters that takes an input phrase consisting of a single word and reverses the sequence of lette
ad-work [718]

Answer:

# The function reverseLetter is defined

def reverseLetter(received_word):

   # The first letter of the word is assigned to a variable using index 0

   firstLetter = received_word[0]

   # The last letter of the word is assigned to a variable using index of

   # string length - 1

   lastLetter = received_word[len(received_word) - 1]

   # reverse letters in between first and last letter is defined as

  # empty string

   reverseBetween = ""

   # A counter is defined to control the loop during the reversal

   # counter value is 2 from the length of the received string

   # The 2 is for the first and last letter remove

   counter = len(received_word) - 2

   # The while loop start

   while counter >= 1:

       # The reverseBetween string is concatenated with corresponding

      # index of received word

       # The index is from high to low since the process is string reversal

       reverseBetween += received_word[counter]

       # The value of counter is decremented

       counter -= 1

   # The reversed string is displayed with no separator

   print(firstLetter, reverseBetween, lastLetter, sep="")    

Explanation:

The code is well commented.

reverseLetter("come") will output cmoe

reverseLetter("welcome") will output wmoclee

reverseLetter("brainly") will output blniary

4 0
3 years ago
The rectangle shape in flowchart is used for
kvasek [131]
<h2>Start</h2>

The rectangle shape in flowchart is used to capture process steps like basic tasks or actions in your process.

4 0
2 years ago
The concept of ____ refers to the idea that the internet is designed for all content to be treated equally.
vitfil [10]
Net neutrality buddy boi
3 0
3 years ago
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • "The network layer is responsible for transferring packets of data from the A.Source computer to the destination computer on adj
    11·1 answer
  • Which are factors that go into a project plan? choose four answers
    14·1 answer
  • my airpods just do not seem to connect if i try to pair them, reset them, they have this continuous green light, please help me
    12·1 answer
  • Please describe in a few sentences
    14·1 answer
  • Microsoft Windows is the least used operating system. TRUE or FALSE.
    13·1 answer
  • What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
    11·1 answer
  • Explain the bad effect and good effect of mobile phone and internet.<br>​
    15·2 answers
  • Lily obtained data from five trails 50 kcal 72 kcal 12 kcal and 50 kcal which best decribes her data
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!