1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
14

What are the differences and similarities of computer virus and biological virus. Give 4 examples

Computers and Technology
1 answer:
Papessa [141]3 years ago
6 0

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

You might be interested in
You are working on a small network. You recently created a wireless network to allow the owners laptop and mobile devices to mak
Gekata [30.6K]

Answer: enable network encryption to prevent authorized computer from accessing the wireless network.

Explanation:

1.open the wireless security settings on your router’s configuration page.

2. select security method you wish to use.

3.Enter a passphrase needed to access the network whenever authorizes personnel want access to network.

5 0
4 years ago
What can web designers use to control the individual web page layouts for all of the pages on a website?
Lyrx [107]
You need to have a redirect link to each page on your homepage. So you have a better and simple navigation on your webpage. Every webpage should have a homepage, so that every person who visits, knows where to go back to.

4 0
4 years ago
it is good to know and use the npsd framework while solution envisioning as part of the value discovery cycle. What is NPSD?
mina [271]

It should be noted that NSPD is an acronym that simply means the New Product and Service Development.

<h3>What is NSPD?</h3>

NPSD simply means the process of New Product and Service Development. It is the process of creating new products or services framework and it can be broken down into several stages.

It is a process of taking a product or service from conception to market. It should be noted that the process sets out a series of stages that new products typically go through.

Learn more about product development on:

brainly.com/question/11223911

3 0
2 years ago
Explain the two filter options available when filtering by a column
dexar [7]
Can you prove more information?
8 0
3 years ago
Read 2 more answers
What will happen if we access all the limitations of computers into it? Just like intelligence, self learning, feeling and other
Elis [28]

Answer:

Explanation:At first, in 1635, the evening meetings had been just for women . . .

What relationship between ideas is shown in the text above?

Question 1 options:

Location of events

Similarity of events

Timing of events

Examples of an idea

6 0
4 years ago
Other questions:
  • To add the word "confidential" to the background of a page, users would need to _____.
    12·1 answer
  • ________ enables advertisers to display more relevant ads based on user's search and browsing history. FIP NORA A Web bug An int
    10·1 answer
  • Case Project 13-3 A cloud customer has asked you to do a forensics analysis of data stored on a CSP’s server. The customer’s att
    6·1 answer
  • You need to deploy a new cloud-based windows intune deployment to manage mobile devices in your organization. drag and drop the
    5·1 answer
  • How can you prevent your VMs receiving DHCP server messages from unauthorized virtual machine pretending to be DHCP servers?
    13·1 answer
  • A computer cannot store the data and information for your future use true or false​
    6·1 answer
  • I need this answer right away!
    13·1 answer
  • Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purc
    12·1 answer
  • The Ingenuity and the MOXIE are two new pieces of technology on the Perseverance. What role will these instruments play? How wil
    6·2 answers
  • I need someone to help me like rnnnnn please
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!