1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grigory [225]
3 years ago
11

What are the features of boot sector virus​

Computers and Technology
1 answer:
zysi [14]3 years ago
3 0

Answer

The only absolute criteria for a boot sector is that it must contain 0x55 and 0xAA as its last two bytes.

hope it helps

mark me brainliest pls

You might be interested in
Select the true statement about HTML. HTML is a language that is used to create Web pages. HTML tags tell a web browser when to
Alexxx [7]

Answer: HTML is a language that is used to create Web pages.

Explanation:

HTML (Hypertext Markup Language) simply refers to the code which is used for the structuring of a web page and its content. e.g the content can be structured by using images, in data tables or within a set of paragraphs.

Therefore, the correct statement about HTML is that HTML is a language that is used to create Web pages.

6 0
3 years ago
Read 2 more answers
Networking is the most effective search method for finding job leads.<br> a. True<br> b. False
natima [27]
True.
This is due to most companies having online websites in our era
3 0
3 years ago
Read 2 more answers
Which font attribute allows you to change the text from bold to
Sladkaya [172]
F o n t T y p e . Yea it’s font Tyler’s
8 0
3 years ago
Read 2 more answers
Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
Lostsunrise [7]
The answer is A. Only Elisa.
5 0
3 years ago
What is the common voltage for a cordless drill battery cell? A. 1.5 VDC B. 2.0 VDC C. 1.0 VDC D. 1.2 VDC
Maksim231197 [3]
The ones here in texas are b it just deponds where you are
5 0
4 years ago
Other questions:
  • Steven is in a meeting and he is sharing a graph on his monitor with fifty other people. So that the others do not need to crowd
    9·1 answer
  • A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks
    11·2 answers
  • "someone has tampered with your computer and erased data". what kind of computer threat is this
    11·1 answer
  • Jimmy is running out of desk space. He keeps three computers on his desk. The three computers can’t be moved, and they need to b
    5·2 answers
  • This type of handout prints only the text of the presentation.
    7·1 answer
  • Which of the following Internet access methods involves connecting your phone to an Internet-ready laptop in order to gain acces
    14·2 answers
  • A great way to obtain Hands-On training in a real quick environment is to complete a ??
    12·1 answer
  • Consider an allocator on a 32-bit system that uses an implicit free list. Each memory block, either allocated or free, has a siz
    11·1 answer
  • Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volu
    8·1 answer
  • Why is cyberbullying so devastating to many people beyond just the victim?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!