1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
3 years ago
11

What are the charactaristic of computer with virus​

Computers and Technology
2 answers:
NISA [10]3 years ago
5 0

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

scoray [572]3 years ago
4 0
A computer virus is any sort of malware, that when executed, copies its source code and then injects itself into other applications. This process then repeats itself over and over again. What the virus does from here can be many things. The virus can act as a keylogger to steal private information, it could also infect your hard drive and secretly upload your files to a server decided by the creator of the virus.
You might be interested in
What feature, new to Windows Server 2012, provides the ability to find identical sets of data on a SAN-based storage array and r
GenaCL600 [577]

Answer:

Data De-duplication

Explanation:

Data De-duplication is a feature that can help reduce the impact of redundant data on storage costs.

When enabled,<em> </em>Data De-duplication optimizes free space on a volume by examining the data on the volume <em>by looking for duplicated portions</em> on the volume. Duplicated portions of the volume's data set are stored once and are (optionally) compressed for additional savings.

Data De-duplication optimizes redundancies without compromising data fidelity or integrity.

7 0
3 years ago
What are the steps to view two different versions of the same document at once? 1. Go to the File tab on the ribbon. 2. Select T
DanielleElmas [232]

Answer:

1.file 2.track changes

Explanation:

thats all i got

3 0
3 years ago
Why Prithvi Narayan Shah are appointed the person favoured by the people at Kazi
mart [117]

Answer:

At one time, Prithvi Narayan Shah could not decide who he should as the Kaji (equivalent to Prime Minister) and Pradhan Senapati (Commander-in-Chief). He had two commanders Biraj Thapa Magar and Kalu Pande in mind.

So, for the decision, he called a Bhaardaari Sabhaa (assembly of the courtiers) along with some people of his kingdom and chose Kalu Pande on the basis of popularity. He instructs his descendants in Divyopadesh to understand the popularity before nominating someone as the Kaji.

This is not a true democratic system as the candidates don't really come from between the people. The candidates are the two people who the King thinks are capable and only wants to know who is popular. This only seems like a precursor of democracy we have today.

I would not call Prithvi Narayan Shah was a democratic king, though

Explanation:

3 0
3 years ago
You can italicize a word by selecting it and clicking the Italics icon. What keyboard shortcut could you use instead of clicking
bogdanovich [222]
If I were you, I would just try each of these. But the actual answer is C. Ctrl+U
The first one is used to copy the text (C-Copy)
The second one bolden your text (B-bold)
The last one is used to manage the scale.


7 0
3 years ago
The proper hand position for keyboarding.
mr_godi [17]

Left fingers on ASDF whilst right hand is on jkl;

A= pinkie

S= ring finger

D=Middle

F=Index.

J=Index.

K=Middle

K=Ring finger

;= pinkie

Hope this helped

5 0
3 years ago
Other questions:
  • PLEASE FILL IN THE BLANK FOR THESE POINTS!!!!!
    15·2 answers
  • find all breweries that specialize in a particular beer style. A brewer is considered specialized if they produce at least 10 be
    5·1 answer
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
    8·1 answer
  • Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma
    11·1 answer
  • Assume that the variable data refers to the list [5, 3, 7]. Write the expressions that perform the following tasks: a. Replace t
    8·1 answer
  • Complete the code to convert a float to a string. <br> answer=5.3 <br> strAnswer=__ (answer)
    12·2 answers
  • Write aemail to brother for laptop for vitrual classes​
    7·2 answers
  • What is information communication technology?
    7·2 answers
  • What network security tool, usually included with Kali Linux, allows a user to ping multiple IP addresses
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!