A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

Answers

Answer 1
Answer:

A computer virus is a program that is installed without the permission or knowledge of the computer user.

It is designed to alter the computer's normal operations and can replicate itself to infect other files, programs, or media it can access. Computer viruses are malicious and often spread through infected files, emails, or downloads.

Once inside a computer system, they can cause various damages, such as corrupting data, stealing personal information, or disrupting the computer's functionality.

As they replicate, they can rapidly spread to other devices and networks, making them a significant threat to the security and integrity of computer systems worldwide.

Protecting against viruses requires robust antivirus software and cautious online behavior.

Know more about computer viruses:

brainly.com/question/29446269

#SPJ5

Answer 2
Answer: That would be a virus.

Related Questions

Microsoft Excel ______ give a visual representation of data that can make the data easier to understand.worksheets workbooks spreadsheets ch21
What is a variable? Why is it helpful in programming?
What programming languages can be used with the Virtual Brick? Virtual Robots 2 : Using Robot Virtual Worlds with Curriculum Launch the Virtual Brick software Choose Target Robot Virtual World Launch the LEGO MINDSTORMS EV3 Programming Software Download your program to the Virtual Brick
What property of semi-metals is useful in the computer industry?a. Semi-conducting c. Ability to bond b. Flexibility d. Highly reactive
Main content (mc) does not include features like search boxes. T or F

Given the int variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another int variable min. Assume that all the variables have already been declared and that x, y, and z have been assigned values.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int x=5,y=2,z=9;

   int min;

   // find the smallest value and assign to min

   // if x is smallest

   if(x < y && x < z)

   // assign x to min

    min=x;

     // if y is smallest

else if(y < z)

 // assign y to min

    min=y;

// if z is smallest

else

 // assign z to min

    min=z;

// print the smallest

cout<<"smallest value is:"<<min<<endl;

return 0;

}

Explanation:

Declare and initialize variables x=5,y=2 and z=9.Then check if x is less than y and x is less than z, assign value of x to variable "min" .Else if value of y is less than value of z then smallest value is y, assign value of y to "min".Else z will be the smallest value, assign its value to "min".

Output:

smallest value is:2

If privileges are greater than those already available to the attacker the result is a _________.

Answers

Answer:

privilege escalation

Final answer:

When an attacker gains privileges greater than what they already have, it's called privilege escalation. Both vertical (becoming a superuser) and horizontal (getting privileges of a peer) are serious security risks.

Explanation:

If privileges are greater than those already available to the attacker, the result is a privilege escalation. In terms of computer security, privilege escalation means that a user receives privileges they are not entitled to. These privileges can be used to delete files, view private information, or even take control of the system. It can occur in two ways: vertical privilege escalation, also known as becoming the superuser, whereby a user can get rights reserved for a user with higher privileges. Horizontal privilege escalation, on the other hand, is when a user is able to acquire the same privileges as another user. In both cases, it represents a serious security risk.

Learn more about Privilege Escalation here:

brainly.com/question/34644252

#SPJ11

Explicit location always tells you where user located when they type the query. T or F

Answers

The answer is false.

An Explicit location is a new concept that Google uses when a searcher is performing a local search and includes the location as well. For instance, instead of searching for “hotel”, the searcher could specify the location and search for Washington Hotel. Searching locations in this way clearly shows that you are looking for something in a specific location. An explicit location is treated as the dominant location of the query and may not be the actual location intent of the query.


The answer would be True that the explicit location always tells you where the user is located when they type the query. It's possible that a geographical model was designed that would geneate the localized results based from the query and the location of the person searching. Google for one has an auto-detection location.

In 1-3 sentences, please describe how a digital ink pen can make a task more efficient.

Answers

It can make it more efficient because it can be neat. It also makes it stand out. That's how using a digital ink pen can help a task be more efficient.

Creating a web diagram is a tool for _____. revising your ideas narrowing your topic generating a topic creating an outline

Answers

Answer:

Narrowing your topic

Explanation:

Creating a web diagram will eventually lead you you to certain points in your study. Thus, web diagrams help to narrow your topic.

Answer: Narrowing your topic. Gradpoint

Choose the term that describes each step of the cycle.------- : gets next instruction

---------- : interprets instruction

----------- : carries out instruction

------------ : saves result of instruction

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to tell the best and suitable terms for the given descriptions in the question.

As we know that a computer program is based on sets of instructions. The CPU carries out the processing using the fetch decode and execute cycle.

It is responsible for implementing a sequence of instructions called a computer program that takes input, processes them, and outputs the result based on processing.

A CPU mainly has three components such as control unit, Arithmetic logic unit,  and register.

The control unit controls all parts of the computer system. It manages the four basic operations of the Fetch Execute Cycle such as Fetch, Decode, Executes, and Storage.

So the correct terms of this question are:

Fetch: Gets next instruction

Decode: interprets the instruction

Execute: Carries out instruction.

Store: Save results of instruction.

The complete steps are:

Fetchgets the next instruction.

Decode interprets instruction.

Executecarries out instruction.

Store saves the result of the instruction.

The terms that describe each step of the cycle in a computer's processing are as follows:

Fetch: This step "gets the next instruction." It involves retrieving the next instruction from memory to be executed by the processor.

Decode: This step "interprets the instruction." In this phase, the processor decodes the fetched instruction to understand what operation it needs to perform.

Execute: This step "carries out the instruction." Here, the processor executes the decoded instruction, which could involve performing calculations, data manipulation, or other operations.

Store (also known as Write Back): This step "saves the result of instruction." After the execution phase, if the instruction modified data in memory, this step writes back the results of the executed instruction into the appropriate memory location.

These four steps together make up the basic fetch-decode-execute cycle of a computer's central processing unit (CPU). The cycle is repeated for each instruction the computer processes, enabling it to perform tasks and run programs.

To learn more about central processing units;

brainly.com/question/6282100

#SPJ3