1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Darya [45]
3 years ago
13

What are the top 10 most dangerous computer viruses ?

Computers and Technology
1 answer:
Solnce55 [7]3 years ago
8 0

Answer:

  • Mydoom
  • Sobig
  • Klez
  • ILOVEYOU
  • WannaCry
  • Zeus
  • Code Red
  • Slammer
  • CryptoLocker
  • Sasser

Explanation:

You might be interested in
The actual database of Active Directory shared resources is stored on one or more computers designated as:
loris [4]

Answer:

The network the actual database of active directory shared resources are stored on one or more computers.

Explanation:

The network:- it is shared resources where it accesses or connected multiple personal computers or workstations or laptops.  So that file or folder have shared the resources

Domain controllers:- It is the server where end-user is able to login into domain server

The extranet:- It is an external net where end-user just access the ISS  server.  This data can be shared  inside and  outside of the network  

The Intranet:-it  is internal  access of   network where  just access  the ISS  server, where data  can be shared  only internal

8 0
4 years ago
Unlike when writing in a programming language, there are no set rules that must be followed when writing pseudocode. What do you
Elan Coil [88]

Answer:

Explanation:

Pseudocode may not have a set number of rules of guidelines but there are still some habits that should be followed. This includes having only one statement per line and add the END keyword to loops. Both of these rules/habits will drastically increase the readability of the pseudocode and allow you to know exactly where a certain loop starts and ends. Since loops can become difficult to read if they have a lot of code within them. Another good guideline to keep in mind is to simplify the code as much as possible do not add unnecessary pseudocode if it is not absolutely needed.

7 0
3 years ago
LAB: Convert to binary - methods
Georgia [21]

Answer:

import java.util.Scanner;

public class Lab{

  public static String integerToReverseBinary(int number)

  {

      String binary = "";

      if(number == 0){

          return "0";

      }

      while(number > 0)

      {

          int remainder = number % 2;

          number = number / 2;

          binary += Integer.toString(remainder);

      }

      return binary;

  }

 

  public static String reverseString(String wordString)

  {

      String binaryString = "";

      int length = wordString.length();

      for(int i = length -1 ; i >= 0 ; i--)

      {

          binaryString += wordString.charAt(i);

      }

      return binaryString;

  }

 

Explanation:

In the java source code, the Lab class is defined which has two methods, 'reverseString' and 'integerToReverseBinary'. The latter gets the argument from the former and reverses the content of its string value, then returns the new string value. The former gets the integer value and converts it to its binary equivalence for which are converted to strings and returned.

8 0
3 years ago
One disadvantage of online information sharing is that:
zubka84 [21]

Answer:

its b i just took the test

Explanation:

3 0
3 years ago
Read 2 more answers
What concerns exist wherever personally identifiable information is collected stored in digital form or otherwise
Brums [2.3K]

Registration

Explanation:

This is because the personally identifiable information is collected and stored either for records.

5 0
3 years ago
Other questions:
  • Spencer is a recent graduate who finds a dream car that costs $45,000. Even better, there's a 0% APR for 36 months offer from th
    13·1 answer
  • ____ uses markup to define the structure and layout of a web document.
    11·1 answer
  • Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. Th
    11·1 answer
  • Using Amdahl’s Law, calculate the speedup gain of an application that has a 60 percent parallel component for (a) two processing
    11·1 answer
  • _________________ is a standard method or protocol for web pages to request special processing on the web server, such as databa
    7·1 answer
  • Which option describes the purpose of configuring native supplicant profile on the cisco ise?
    7·1 answer
  • I NEED answers for these qu plz
    5·1 answer
  • Which is the most correct option regarding subnet masks?
    10·1 answer
  • Anyone know how to do Calculator program in python ?
    14·1 answer
  • WRITE A PROGRAM TO CALCULATE SIMPLE INTEREST
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!