1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
2 years ago
14

What are the differences and similarities of computer virus and biological virus. Give 4 examples

Computers and Technology
1 answer:
Papessa [141]2 years ago
6 0

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

You might be interested in
Malcolm Movers charges a base rate of $200 per move plus $150 per hour and $2 per mile. Write a program named MoveEstimator that
jeka94

Answer:

import java.util.Scanner;

public class MoveEstimator

{

public static void main(String[] args) {

   

    Scanner input = new Scanner(System.in);

    final int BASE_RATE = 200, RATE_PER_HOUR = 150, RATE_PER_MILE = 2;

    int hours, miles;

    double totalFee = 0.0;

   

 System.out.print("Enter the number of hours for a job: ");

 hours = input.nextInt();

 System.out.print("Enter the number of miles: ");

 miles = input.nextInt();

 

 totalFee = BASE_RATE + (hours * RATE_PER_HOUR) + (miles * RATE_PER_MILE);

 System.out.printf("For a move taking %d hours and going %d miles the estimate is $%.2f", hours, miles, totalFee);

}

}

Explanation:

*The code is in Java.

Create the Scanner object to be able to get input

Initialize the constant values using final keyword, BASE_RATE, RATE_PER_HOUR, RATE_PER_MILE

Declare the variables, hours, miles, totalFee

Ask the user to enter the hours and miles

Calculate the totalFee, add BASE_RATE, multiplication of  hours and RATE_PER_HOUR, multiplication of  miles and RATE_PER_MILE

Print the output as in required format

6 0
2 years ago
Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and
makkiz [27]

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

7 0
3 years ago
The ____ auto fill option that fills the destination area using the format of the source area; no content is filled.
attashe74 [19]
The AUTO FORMATTING ONLY is an auto fill option that fills the destination area using the format of the source area; no content is filled. This is opposite from auto without formatting on which it fills the destination area without formatting.
5 0
3 years ago
Question: define oprators​
Svetlanka [38]

Answer:

Explanation:

Operator can be defined as

a character or characters which gives determination of actions that are needed to be performed/ considered. Operators are symbols that gives the compiler information to perform specific mathematical/logical manipulations.They are special type of functions, which are capable of taking one or more arguments, then produces a new value. Different types of operator are;

✓arithmetic operators(addition "+" substraction "-"

✓relational operators( greater than ">"

lesser than"<"

✓Logical operators.( Connective words/symbols such as AND, NOT, OR)

Arithmetic Operators: These include "+" (addition), "-" (subtraction), "*" (multiplication), "/" (division), "\" (integer

5 0
2 years ago
5 QUESTIONS, BRAINLIEST, PLEASE ANSWER
lara [203]

Answer:

1. Input() is the correct answer

2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .

3.The int() function converts the specified value into an integer number.

4.CandyCost = int(input("How much is the candy?"))

5.int()

ANSWERS

8 0
3 years ago
Other questions:
  • Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an att
    12·1 answer
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • The email program shipped with Microsoft office
    15·1 answer
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • Which wireless communication technology is most likely used when synchronizing device information to an automobile?
    9·1 answer
  • Devon would like to install a new hard drive on his computer. Because he does not have a SATA port available on his motherboard,
    7·1 answer
  • photoshop Curves, photoshop an image and manipulate the curves on a selection of the photo. upload the original photo and The ph
    5·2 answers
  • Who was the father of computer?????​
    11·2 answers
  • How many operations can a computer perform every second?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!