1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
3 years ago
7

In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro

ughout the host program, overwriting the original contents of the host.
Computers and Technology
1 answer:
shusha [124]3 years ago
5 0

Answer:

Split Infection

Explanation:

In the split infection technique, each time the file is opened either by the user or the system operating system, the virus copy itself into another file on the same system and unload malicious payloads to perform some actions. While this is ongoing, the virus erase file from the user hard drive and might even go as formatting the hard disk drive.

It should be noted that the virus cannot transfer itself from one computer to another

You might be interested in
If Twitter were to exclusively use e-mail, collaborative computing, and other computer connections to connect geographically sep
sweet-ann [11.9K]

Answer:

Virtual is the correct answer for the above question.

Explanation:

A Virtual organization is a collection which is used to connect the geographical people, organizational units, employees, individuals and groups for some communication purpose. Virtual means that there is some existence like physically but it is not physically present. So the organization also connects the person and gives the real scenario with the help of some software for communication.

The question states that if twitter uses email and other computing connections to connect people globally then it comes in the Virtual department because it follows the concept of the virtual department. Hence Virtual is the correct answer.

5 0
3 years ago
I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My te
Mama L [17]

Answer:

I think we are so this is hard lol

Explanation:

we are not too dependable

things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online

this is hard if I can think of any others I'll come back I'm sorry if this isn't any help

7 0
3 years ago
Read 2 more answers
I am trying to go into my outlooks, email but it says. :-( Something went wrong You're currently signed in as ||my hotmail|| . P
Ksju [112]

Answer:

ok???

Explanation:

4 0
2 years ago
Explain three of the the features of the word processing to document. ​
boyakko [2]

Word processing software may be used to create, edit, save, and print documents, among other things. Text within a document may be copied, pasted, moved, and deleted. Text formatting includes font selection, bolding, underlining, and italicizing.

4 0
2 years ago
Read 2 more answers
Juan has performed a search on his inbox and would like to ensure that the results only include those items with
kogti [31]

Answer: Refine

Explanation:

From the question, we are informed that Juan has performed a search on his inbox and would like to ensure that the results only include those items with attachments. The command group that he'll use will be the resume command group.

The refine command group help are one whereby the results include the items that have attachments. Therefore, the answer will be option C "Refine".

5 0
3 years ago
Read 2 more answers
Other questions:
  • Jabari created new video game for his coding course. What is one way he should format his pseudocode?
    12·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    9·2 answers
  • And what way do you mixed and market economy support the ideals of democracy​
    12·1 answer
  • In what way do networks help to protect data
    6·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
    11·1 answer
  • A time stamp indicates the date and time that a measurement was taken. A data scientist has a list containing 10,000 time stamps
    6·1 answer
  • Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!