Answers

Answer 1
Answer:

It is a (software) program that is installed on a computer without the user's knowledge for the purpose of making harmful changes. A computer virus attaches itself to another program (the execution of the host program triggers the action of the virus). And most of them perform actions that are malicious in nature, such as destroying data. A computer virus operates in two ways: As soon as it lands on a new computer, begins to replicate or it plays dead until the trigger kick starts the malicious code. The term 'computer virus' was formally defined by Fred Cohen in 1983.

Answer 2
Answer:

Answer:

A computer virus is a virus attached onto your computer, and it gives you bugs and can often delete your important files.


Related Questions

Answer this question without running pin again. Assume that the 100,000 element integer array that you allocated starts at address 0x50000000 in memory, the size of an integer is 4 bytes and the D-cache is initially empty. As you read the integers in the array one-by-one, starting at index 0, how many D-cache misses will you see for reading the first 40 integers when the cache block size is:
Describe how data is transmitted using half-duplex serial data transmission.
Outline 3 computer system problem that could harm people and propose the way avoid the problem​
Subtract (100000)2 from (111)2 using 1s and 2s complement method of subtraction​
Write a c++ program to find; (I). the perimeter of rectangle.(ii). the circumference of a circle.Note: (1). all the programs must allow the user to make his input .(2).both programs must have both comment using the single line comment or the multiple line comment to give description to both programs.​

Write a program (main method) that advises the user on programming language. So if a user for instance enters "Java" the program might say "awesome" or if the user enters "Ruby" it might say "are you sure?" . Make the program comment on at least 5 programming languages.

Answers

import java.util.Scanner;

public class JavaApplication41 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String language = scan.nextLine();

       if (language.toLowerCase().equals("java")){

           System.out.println("Awesome!");

       }

       else if (language.toLowerCase().equals("python")){

           System.out.println("A very simple language!");

       }

       else if (language.toLowerCase().equals("ruby")){

           System.out.println("Are you sure?");

       }

       else if (language.toLowerCase().equals("javascript")){

           System.out.println("Easy enough");

       }

       else if (language.toLowerCase().equals("c")){

           System.out.println("Cool!");

       }

   }

   

}

I hope this helps!

What is the tool that is used to automatically search New information on the internet and organize if for future searches?

Answers

the answer would be a "web crawler"

the UDP server described needed only one socket, whereas the TCP server needed two sockets. Why? If the TCP server were to support n simultaneous connections, each from a different client host, how many sockets would the TCP server need?

Answers

Answer:

The UDP server described needed only one socket, whereas the TCP server needed two sockets because:

  • With the UDP server, there is no welcoming socket, and all data from different clients enters the server through this one socket.
  • With the TCP server, there is a welcoming socket, and each time a client initiates a connection to the server, a new socket is created. Thus, to support n simultaneous connections, the server would need n+1 sockets.

Answer:

UDP uses one socket and TCP requires two sockets in a transmission because UDP is a way one connectionless protocol but TCP is connection oriented.

The TCP server that supports n simultaneous connections would require n sockets, ranging from 1 through n.

Explanation:

A socket is a fusion of a port number and a source IP address using a colon.

UDP is a transport layer protocol that is unreliable, because it does not need to establish connection to transmit packets and does not retransmit dropped packets. TCP is another transport layer protocol that is reliable, establish connection and retransmit dropped packets.

For a UDP, only one socket would be created to transmission. A socket on the client side and server side would be created in TCP connection. A server can have multiple sockets for one or different transmission protocols.

A constructor (check all that apply): Group of answer choices will always result in a run time error and program crash if it fails to test a parameter's value for validity before assigning the parameter's value to member. This will happen the first time we run a program, and alert us to the fact that there is a problem. must use mutators to initialize class data. must use assignment statements to initialize class data. may use assignment statements to initialize class data. may use mutators to initialize class data. will receive a compiler error if it fails to test a parameter's value for validity before assigning the parameter's value to member.

Answers

Answer:

Must use mutators to initialize class data.

May use assignment statements to initialize class data.

Explanation:

These are the two characteristics that are present in constructors. A constructor is an instance method of a class or structure that creates an object of the class to which it belongs. This is mostly used in object-oriented programming. These constructors usually have the same name as the actual class, and can be used in order to set the values of the members of an object.

Which statement must be included in a program in order touse a deque container?a. #include vector

b. #include

c. #include container

d. #include deque

Answers

Answer:

d.#include deque

Explanation:

We have to include deque library in order to use a deque container and the syntax to include is #include<deque>.Deque is a double ended queue which is a sequence container and allows operations of contraction and expansion on both ends of the queue.Double ended queues are a special case of simple queue since in simple queue the insertion is from rear end and deletion is from front end but in deque insertion and deletion is possible at both ends rear and front.

NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world. When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc. NMCI is an example of a(n):

Answers

Answer:

The answer is "Intranet".

Explanation:

The intranet becomes an information exchange computer network, in which the resources collaborate with OS and other computing infrastructure within the organization. It is usually done without access from third parties and primarily uses for analysis of the data.

Here, the NMCI links the computer network of navy and maritime bodies on the bases of both the boats and the regional offices, that's why we can say that it is the example of the Internet.