1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inn [45]
4 years ago
7

In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions thro

ughout the host program, overwriting the original contents of the host.
Computers and Technology
1 answer:
shusha [124]4 years ago
5 0

Answer:

Split Infection

Explanation:

In the split infection technique, each time the file is opened either by the user or the system operating system, the virus copy itself into another file on the same system and unload malicious payloads to perform some actions. While this is ongoing, the virus erase file from the user hard drive and might even go as formatting the hard disk drive.

It should be noted that the virus cannot transfer itself from one computer to another

You might be interested in
if a network security professional wants to connect some computers in the same building without it using a router what type of n
marta [7]

Answer:

 the MAC addresses of wireless NICs

Explanation:

8 0
3 years ago
Read 2 more answers
A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato
elena-s [515]

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

8 0
3 years ago
_______ can be used more than once.
torisob [31]
EPROMS, (sorry for late answer)

5 0
3 years ago
You can use the results from a search on a database in all of these ways except to ____.
Oksanka [162]
<span>Hello </span><span>Savonahdeedss4938
</span><span>

Answer: You can use the results from a search on a database in all of these ways except to create records


Hope this helps
-Chris</span>
4 0
3 years ago
Read 2 more answers
Someone else can drive your car if _____.
SVETLANKA909090 [29]

Answer:

C. you have proof of insurance

Explanation:

Residency has nothing to do with permission to drive a car. For example, someone may have residency, but be with a license suspended. So they can't drive.

Usually, also the insurance covers the CAR and not the person. So the general rule is:

Someone else can drive your car if you have proof of insurance

6 0
4 years ago
Read 2 more answers
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • Why would a person who handles electronic components wear a grounded wrist strap
    13·1 answer
  • Craig wants to create a computing infrastructure that will allow developers within his company to build applications on a primar
    9·1 answer
  • Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
    11·1 answer
  • When sending an email to work colleagues you should NOT use ____________.
    8·1 answer
  • In Linux, users are internally represented using a unique number called user ID or uid.
    9·1 answer
  • A patient calls the insurance company's call center
    15·2 answers
  • The border to the right of a column is called the ____.
    12·1 answer
  • What does it mean that the right mouse button is context-sensitive?
    15·1 answer
  • Word wrap is the same as __________ return and means you let the ______________ control when it will go to a new line.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!