1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
5

Types of computer viruses​

Computers and Technology
2 answers:
Rzqust [24]3 years ago
7 0

Answer:

Boot Sector Virus

File Deleting Virus

Directory Virus

FAT Virus

Direct Action Virus

Resident Virus

Multipartite Virus

Macro Virus

Polymorphic Virus

Retrovirus

Tunneling Virus

Armored Virus

Stealth Virus

Nonresident Virus

Sparse Infector

Overwrite Virus

Spacefiller Virus

File Infector Virus

Web Scripting Virus

Browser Hijacker

Mass Mailer Virus

Encrypted Virus

Companion Virus

Network Virus

e-lub [12.9K]3 years ago
5 0

Answer:anti various

Explanation:hope fully this will help u

You might be interested in
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
antiseptic1488 [7]

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, <u>it would have been better if the writer includes experience with a computer virus</u> so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

3 0
3 years ago
S.B. manages the website for the student union at Bridger College in Bozeman, Montana. The student union provides daily activiti
Varvara68 [4.7K]

Answer:

hi

Explanation:

i did not known answers

3 0
3 years ago
.....is used to save project in Visual basic .net from file menu
Harlamova29_29 [7]

Explanation:

I don't really understand what you're trying to get at, maybe try to abbreviate a little more?

4 0
3 years ago
Which is true regarding pseudocode?
bearhunter [10]

Answer:

It uses simple words and symbols to communicate the design of a program

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language. Also, a pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

This ultimately implies that, a pseudocode uses simple words and symbols to communicate the design of a program.

8 0
3 years ago
Read 2 more answers
According to the presentation, integrity and ethics are particularly important for careers in which of the following pathways?
Aloiza [94]

Journalism and Broadcasting

3 0
3 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • What is the formula for calculating the average of cells<br> C2 through C30?
    15·1 answer
  • Which osi reference model layer includes all programs on a computer that interact with the network?
    13·1 answer
  • How can a user preview the playback of an audio clip in PowerPoint? Use the drop-down menus to complete the statements.
    14·1 answer
  • What is a computer OPERATING SYSTEM?
    5·1 answer
  • What is the disadvantage of server based network?
    7·2 answers
  • Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk
    8·1 answer
  • Bloxburg Build can anyone help me
    14·2 answers
  • A trace table is used for
    5·2 answers
  • True of false that the memory of laptop is normally measured in kilobytes
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!