why is computer virus called destructive program​

Answers

Answer 1

Answer:

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

Viruses which are the most commonly-known form of malware and potentially the most destructive. A virus can do anything from erasing the data on a computer to hijacking a computer to attack other systems, send spam, or host and share illegal content.

Explanation:

The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally because they are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Some viruses wreak havoc as soon as their code is executed, while others lie dormant until a particular event (as programmed) gets initiated, that causes their code to run in the computer. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected email attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.  


Related Questions

Question 11
Methods that return a decimal value must be declared using what type?


a. int

b. void

c. double

d. String

e. null


Question 12

Which of the following is true when x = 15?


a. (x >= 15) && (x < 13)

b. !(x > 13) || (x > 16)

c. (x > 13) && (x < 17)

d. (x < 15) || (x > 15)

e. (x <= 13) || (x >= 17)

Answers

Answer:

11. a, 12.c

Explanation:

bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17

what computer is designed for particular application​

Answers

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

List three (3) features of first generation computer
PLEASE HELP!!!!!

Answers


Features of first generation computers:

Technology used: vacuum tube.

Machines languages were used to instruct the computer.

Magnetic core memory was used as primary memory.

Electrostatic tubes, Parer tape, punch card, magnetic tape.

difference between boot disk and booting in 5 points​

Answers

[tex]Answer \: -[/tex]

In computing, booting is the process of starting a computer. It can be initiated by hardware such as a button press, or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.

A boot disk is a removable digital data storage medium from which a computer can load and run an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards.

The software which manages environment for running programs handling error controlling devices configuring the computer system and managing the resources of a computer.
Write the technical term of the given question of the picture .
Correct Answer =⟩ Thanks
Best answer =⟩ Brainliest
Random answer =⟩ Reported and deleted ​

Answers

Answer:

D

Application

System software is the set of programs that enables your computers hardware devices and Application software to work together.

Practical computer systems divide software systems into two major classes: System software: Helps run the computer hardware and computer system itself. System software includes operating systems, device drivers, diagnostic tools and more. ... (Some application software is pre-installed on most computer systems.)

Explanation:

A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a

Answers

Answer:

hot site

Explanation:

Pls help me pls I’m struggling

Answers

Answer:Turn Right () Degrees (block)

The turn right () degrees block is a Motion block and a stack block. The block turns its sprite's direction the specified amount of degrees clockwise.

which subunit of a heterodimeric cdk is the regulatory subunit?

Answers

The answer is cyclin subunit

what method does a gsm network use to separate data on a channel?

Answers

It uses TDMA method

Can someone please help

Answers

Answer:

Explanation:

la reponse est le premier et le 3 eme pointcar en effet le premier point c est logiqye e le 2 e aussi  

Which of the following programming scenarios would benefit most from the use of lists?

Answers

The programming scenarios which would benefit most from the use of lists is: B. writing a program to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score).

Computer programming involves the process of designing and developing an executable instructions (codes) or collection of data to perform a specific task.

In Computer programming, a list can be defined as an abstract data type that represents a finite number of either ordered or unordered values. Thus, a list can be used to perform the following tasks:

Store data items.Delete data items.Add data items.

A computer program that is used to calculate statistics about a large set of exam scores (e.g highest/lowest score, median average score) would benefit most from the use of lists because it comprises a set of numerical values that can be sorted in either an ordered or unordered array.

Read more on lists here: https://brainly.com/question/15092271

lenny joggy along a trail for 1.35 hours he ran at a pace of 3.2 miles per hour. how far did lenny jog?

Answers

Answer:

Lenny jogged along a trail for 1.35 hours. He ran at a pace of 3.2 miles per hour. How far did Lenny jog? Answer Lenny jogged 4.32 miles.

Explanation:

What do software engineers use as tools to provide automated support for the development of the system

Answers

Answer: CASE

Explanation:

In the earliest stages of human history, what was the only medium?
ink
books
the human body
magazines

Answers

The only medium that was used for the dissemination of information during the earliest stages of human history is: C. the human body.

Information sharing is an integral part of human life because no human is able to live comfortably in isolation without the need to share or receive messages from others through a particular medium, especially for awareness, growth, development and proper decision making.

Prior to the medieval period, which is the earliest stage of human history, the human body serve extensively as the only medium that was used for the dissemination of information from one person to another.

This ultimately implies that, various symbols, signs and objects that were  mutually understandable to the people were drawn or written on human body, so as to serve as a medium during the process of communication.

Read more: https://brainly.com/question/14810228

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

Answers

Answer: bastion host

Explanation:

This is an image of the ...........................Topology.

if answer Correct i will mark the first person brainly.​

Answers

Answer:

Mesh

Explanation:

To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library

Answers

Answer: import

Explanation:

What is the main difference between structured and unstructured data?

Answers

Answer:

answer is 4.

Explanation:

for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

3.) The primary storage device that holds the data currently being processed by the computer is​

Answers

Computer memory I hope it works

Answer:

I personally think its a hard drive or something like that,im not a computer expert to be honest

Brake fluid is made up of a chemical that:​

Answers

hi there!

Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.

hope this helps.

Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​

Answers

Answer:

The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.

Hope that helps. x

about how many smart devices are active today coinbase

Answers

Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.

What is Smart Device?

Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.

Examples of Smart Devices

Smart devices generally include the following:

SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.

Hence, in this case, it is concluded that the correct answer is 21.5 billion.

Learn more about Smart Device here: https://brainly.com/question/24803254

solve each of the following a. 3x=27 ​

Answers

Answer:

3^(x)=27     x=3

Explanation:

3x3x3 27

:)

3ˣ = 27

Factorise 27.

27 = 9 × 3

27 = 3 × 3 × 3

27 = 3³

So,

3ˣ = 27

=》ˣ = ³

3³ = 27

_____

Hope it helps ⚜

what information about a cisco router can be verified using the show version command?

Answers

- the routing protocol version that is enabled.
- the value of the configuration register.
- the operational status of serial interfaces.
- the administrative distance used to reach networks.

You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable

Answers

Answer:A. A default Variable

Explanation:

Answer:

A

Explanation:

Did it on a Test

once multiple layers are selected which keyboard shortcut merges them

Answers

Considering the computer system analysis, when the multiple layers are selected, the keyboard shortcut that merges them is "Ctrl+E for (Windows) or Command+E for (Macbook)."

What Keyboard Shortcut?

Keyboard Shortcut combines keyboard keys to ensure software programs perform specific functions.

Keyboard Shortcuts can be made by a Computer manufacturer as part of the standard functionality of the operating system or application program or made explicitly by the user in a scripting language.

Keyboard Shortcut is different in both Windows and Macbook Operating systems.

Hence, in this case, it is concluded the correct answer is "Ctrl+E for (Window) / Command+E for (Macbook)."

Learn more about Keyboard shortcuts here: https://brainly.com/question/14447287

Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD

Answers

Answer:

C

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users

Answers

A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.

An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.

In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).

Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.

In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.

Read more: https://brainly.com/question/5660386

According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.

Answers

Answer:

a hypothesis that forms into a question.

Explanation:

Other Questions
solving the math function What is the surface area of the rectangular prism?2 m10 m5 m The central teaching of the Quran is that __________.A.there is only one GodB.humanity is the key to lifeC.daily prayers are requiredD.Muhammad is the last prophet The formula for electrical power is. Which is the equivalent equation solved for i?. 2) A gym charges a $30 membership fee and $10 per month. Write anequation to represent this situation. Find the cost for 5 months. If a newmember paid $160, how many months did they go to the gym? what is the primary reason employers don't like to see resume templates? when we simplify (ab + 3c)^2 we get A team of scientists is conducting tests to measure the boiling point of a liquid using a thermometer in the liquid. The team isthen recording the temperature where the liquid changes from a liquid to a gas rapidly. After 100 trials, the results are 5 degreesbelow the expected results. Which next step is most reasonable? (1 point)O checking the calibration of the thermometer to ensure that it is giving accurate readingsO assuming that the new results are incorrectO assuming that the previous measurements are incorrectO checking the insulation of the apparatus to find out if heat is escaping 5. In class, you recently had a discussion about whether towns and cities should have more parks and green spaces.You have decided to write an article for your school magazine. WILL GIVE BRAINLIEST THANK AND FIVE STAR!Which equation is equivalent to 32x4y+1=0?y=4x1y is equal to 4 x minus 1y=38x14y is equal to negative 3 eighths x minus 1 fourthy=38x+14y is equal to 3 eighths x plus 1 fourthy=4x+1 18.Which of the following would be an example of an animal being in the lower limitof tolerance?a. A shark in warm water.b. A bird in a tree that has everything it needs.C. A frog being in water that is too cold to maintain homeostasis.d. None of the above Use the properties of operations to write an expression equivalent to 4x+1/2+2x-3. Please include explanations. Thanks! Can you help me one more time please . Why does the Moon have a greater effect on the tides compared to the Sun? (Select all that apply.)1. The Moon is smaller than the sun.2. The Moons pull on Earths oceans is stronger.3. The Suns pull on Earths oceans is stronger.4. The Sun is closer to Earth.5. The Moon is closer to Earth. bobby has two poatatos he wants more so he pick 100 mor he sharees them amongst three friends EQUALY how many poatatos does each friend get? Vocab:means a rocky outcrop.amotifbdecorouscofficiousD.scar help with this please The price of an item has risen to $152 today. Yesterday it was $95. Find the percentage increase. Plzzz helppo Which allele is recessive?Which allele is dominant? standing on your tiptoes requires contraction of which lower leg muscle?