1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
5

Types of computer viruses​

Computers and Technology
2 answers:
Rzqust [24]3 years ago
7 0

Answer:

Boot Sector Virus

File Deleting Virus

Directory Virus

FAT Virus

Direct Action Virus

Resident Virus

Multipartite Virus

Macro Virus

Polymorphic Virus

Retrovirus

Tunneling Virus

Armored Virus

Stealth Virus

Nonresident Virus

Sparse Infector

Overwrite Virus

Spacefiller Virus

File Infector Virus

Web Scripting Virus

Browser Hijacker

Mass Mailer Virus

Encrypted Virus

Companion Virus

Network Virus

e-lub [12.9K]3 years ago
5 0

Answer:anti various

Explanation:hope fully this will help u

You might be interested in
Where does blood travel when it leaves the right ventricle of the heart
tensa zangetsu [6.8K]
The right ventricle contracts, and blood is forced through the pulmonary semilunar valve into the pulmonary artery. It then travels to the lungs. Hope this helps!
3 0
2 years ago
Read 2 more answers
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
Which of the following statements is TRUE of business intelligence (BI) systems? Business intelligence systems are primarily use
Scrat [10]

Answer:

D) Business intelligence systems analyze an organization's past performance to make predictions is the correct answer.

Explanation:

  • Business intelligence systems represent systems that help the business in the decision making and strategic making method.
  • BI provides is applications that help in the analysis, collection, and integration of business information.
  • Business intelligence systems help the organization to analyze the business trends and to find the problems that occur in the business that is required to be examined.

5 0
3 years ago
How do you create speaker note changes that show the slides, related notes and company logo on each page
attashe74 [19]

Answer:

The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.

3 0
2 years ago
This is a type race kindly join.
xeze [42]

Answer:

NO THANKS FOR THAT I WILL NOT JOIN

8 0
3 years ago
Other questions:
  • What is computer hacking?
    11·2 answers
  • What's the difference between intranet and extranet ​
    9·1 answer
  • You will be creating a quiz grading program. You will compare the student's answers with the correct answers, and determine if t
    15·1 answer
  • Write an application that determines which, if any, of the following files are stored in the folder where you have saved the exe
    10·1 answer
  • Which task can a company perform with intranets
    8·1 answer
  • mta software development fundamentals You are creating an application that accepts input and displays a response to the user. Yo
    10·1 answer
  • Complete the statement about WYSIWYG editors when you use a WYSIWYG editor you typically specify the continent and blank A.layou
    5·1 answer
  • One of your start-ups uses error-correcting codes, which can recover the original message as long as at least 1000 packets are r
    8·1 answer
  • An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is a
    10·1 answer
  • This computer is used by touching your finger.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!