1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mestny [16]
3 years ago
13

75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro

und the globe. Create a timeline of these viruses, and discuss how each of them worked and spread.
Computers and Technology
1 answer:
Alika [10]3 years ago
8 0

Answer:

Y2K - Y2K is a type of macro virus that targets those files that are created using programs such as Word, Excel, etc. Discovered - 1991

CMJ - These viruses install themselves as a part of the operating system.

Trivial.88.D - This is also a type of File infector virus that attacks a file and deletes the information it may contain.

Vienna virus - Is a type of Direct Action Viruses that can be found in the root directory of a hard disk.

Brain Virus - It is a Boot Infector Virus that often attack the master boot record of a hard disk.

Sweeper - It is a malware designed to appear as an anti-virus program. It's also known as 'Rouge'.

Trojan Horse - It imitates the appearance of a regular software and it attacks the computer system by deleting and sometimes re-creating the system files.

Spyware - It is a type of malware that operates to infringe upon the user's privacy.

Worms - It is a malicious program that replicate themselves from one system to another, through a network like worms.

Hope it helps :)

You might be interested in
For our computer club in school, we are making a discord server and seeing who can get the most members. I am making an Anime Se
Gwar [14]

Answer:

misteragua#1874

Explanation:

5 0
2 years ago
Please complete the spelling please tell fast.​
LenaWriter [7]

Answer:

spacebar and number i think

Explanation:

5 0
3 years ago
Read 2 more answers
Multiply each element in origList with the corresponding value in offsetAmount. Print each product followed by a semicolon (no s
oee [108]

Answer:

Replace /* Your code goes here */  with

for(i =0; i<NUM_VALS; i++) {

    printf("%d", origList[i]*offsetAmount[i]);

printf(";");

}

Explanation:

The first line is an iteration statement iterates from 0 till the last element in origList and offsetAmount

for(i =0; i<NUM_VALS; i++) {

This line calculates and print the product of element in origList and its corresponding element in offsetAmount

    printf("%d", origList[i]*offsetAmount[i]);

This line prints a semicolon after the product has been calculated and printed

printf(";");

Iteration ends here

}

5 0
2 years ago
Double[][] vals =
Vilka [71]

Answer:

4

Explanation:

by counting the number of the colum to. be counted well and nicely

8 0
3 years ago
What are impacts of ict in every day your life?describe if prifely​
telo118 [61]

Answer:

ICT is a broad subject and a concept of evolving.It covers any product that will store, retrieve, manipulate, transmit, or receive information electronically in a digital form.

Explanation:

HOW WE USE ICT IN OUR DAILY LIFE

COMMUNICATION

JOB OPPORTUNITIES

EDUCATION

SOCIALIZING

POSITIVE IMPACT OF ICT IN OUR DAILY LIFE

1.Easy to access information:

I use ICT to access more information that I need for everyday schooling.Because Internet has more faster than searching to a school library. Even the deadline of my research is coming, I can make it fast with the help of ICT

2. Education: distance learning and on-line tutorials. New ways of learning, e.g. interactive multi-media and virtual reality.

3.Free access of sharing like photo,video,and message

5 0
2 years ago
Other questions:
  • Why does a satellite requires two bridges?
    11·1 answer
  • What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
    9·1 answer
  • What does that program print out?<br><br> a) 2<br> b) 3<br> c) 4<br> d) 8
    14·2 answers
  • Write an if/else statement that assigns 0 to x when y is equal to 10; otherwise it should assign
    9·1 answer
  • Banks use _____, which are electronic transmissions of account exchange information over private communications’ networks.
    14·1 answer
  • A USB device used to transfer photos from the memory card to a hard drive is called a _____.
    12·1 answer
  • Computer A has an overall CPI of 1.3 and can be run at a clock rate of 600 MHz. Computer B has a CPI of 2.5 and can be run at a
    6·1 answer
  • Short notes on Supply chain Management System (SCMS)
    12·1 answer
  • Complete each sentence using the drop-down menu. Information on local driving laws can be found on a website. A class textbook c
    9·2 answers
  • Do anyone else receive random points from Brainly… because I swear I had like 2K+ something and I check and Im at ACE… and with
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!