1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
5

Types of computer viruses​

Computers and Technology
2 answers:
Rzqust [24]3 years ago
7 0

Answer:

Boot Sector Virus

File Deleting Virus

Directory Virus

FAT Virus

Direct Action Virus

Resident Virus

Multipartite Virus

Macro Virus

Polymorphic Virus

Retrovirus

Tunneling Virus

Armored Virus

Stealth Virus

Nonresident Virus

Sparse Infector

Overwrite Virus

Spacefiller Virus

File Infector Virus

Web Scripting Virus

Browser Hijacker

Mass Mailer Virus

Encrypted Virus

Companion Virus

Network Virus

e-lub [12.9K]3 years ago
5 0

Answer:anti various

Explanation:hope fully this will help u

You might be interested in
Task 1 – File Input
e-lub [12.9K]

Answer:

Check the explanation

Explanation:

using System;

using System.IO;

                 

public class Program

{

 

  public static void Main()

  {

      string[] lines;

      Console.WriteLine("enter name of the file");

      String fileName=Console.ReadLine();

     

      Console.WriteLine("enter path of the file");

      String filePath=Console.ReadLine();

     

      using (StreamReader streamReader = File.OpenText(filePath))

      {

          String text = streamReader.ReadToEnd();

          lines = File.ReadAllLines(filePath);

      }

      Console.WriteLine("Enter path of the file to write");

      String outputFilePath = Console.ReadLine();

      bool fileExist = File.Exists(outputFilePath);

      if (fileExist)

      {      

                  overWriteOrChangeFileName(outputFilePath);          

      }

      else

      {

          File.Create(outputFilePath);

          File.WriteAllLines(outputFilePath, lines);

      }

      Console.Write("Input file Path"+filePath);

      Console.Write("output file path"+outputFilePath);

     

      void overWriteOrChangeFileName(String filePathtoCheck){

          Console.WriteLine("File exists. Do you want to overwrite the file or do you want to change the location and file name of the new file.Press Y to overwrite and press C to change the location and filename");

          String userInput=Console.ReadLine();

          if(userInput.Equals("Y")){

File.WriteAllLines(outputFilePath, lines);

          }else{

              Console.WriteLine("enter new path of the file including filename");

              String NewFileName=Console.ReadLine();

              outputFilePath=NewFileName;

              if(File.Exists(outputFilePath)){

                  overWriteOrChangeFileName(outputFilePath);                  

              }

              else

      {

          File.Create(outputFilePath);

          File.WriteAllLines(outputFilePath, lines);

      }

          }

      }

  }

 

}

3 0
3 years ago
Which of the following statements about renting and owning
laila [671]
Renting means you sign a contract or a lease to live their owning means you bought the house and pay mortgage <span />
5 0
3 years ago
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
Helen is having a meeting with her colleagues in her company. They are working on the goals and objectives for the coming year.
bekas [8.4K]
<span> Get assistance from </span>colleagues<span> when </span>your <span>relationship with the employee threatens </span>your objectivity. <span>A performance appraisal </span>meeting<span> should be a two way </span>process<span>.</span>
4 0
3 years ago
Read 2 more answers
When editing the master slides, if you edit the layout on the title page, those changes appear on:
Fed [463]

D. only the first title slide in the presentation.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Endnotes into a document are automatically positioned at the bottom of the page where the endnote reference is inserted.
    5·1 answer
  • Can you subnet the 172.16.128.0/17 network address to support this subnet?
    6·1 answer
  • All objects in an object-oriented program are instantiated (created) from a ____.
    12·1 answer
  • Identify the false statement.
    8·1 answer
  • NEED HELP NOW 25 POINTS!!!!!!
    15·2 answers
  • I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
    13·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
    11·2 answers
  • Each Google My Business location has a unique ID that applies changes to the right listing.
    11·1 answer
  • What is essential for a good study routine? Select four options.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!