answersLogoWhite

0

camputer virus law

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What type of program is a backdoor?

They are computer viruses that let hackers and other viruses in to your computer undetected. They are computer viruses that let hackers and other viruses in to your computer undetected.


Why should you scan files when passed from one computer to another?

To avoid Computer Viruses to protect one computer to another computer.


Differences between computer law and computer ethics?

Computer Law - is a set of recent legal enactments, currently in existence in several countries. while Computer Ethics more on covers for the actions that is done with the computer, whether it is ethically good or unethical.


Can yahoocom give your computer viruses?

No Yahoo.com does not give your Computer viruses


How do you get viruses out of computer?

by anti-viruses


How are real viruses unlike computer viruses?

a computer virues afects your computer and a virues afects you


What are the 3 types viruses?

Computer viruses, Macro Viruses, and Directory Viruses


What is Computer Fraud and Abuse?

Under the Computer Fraud and Abuse Act of 1986, this law covers safeguards against cybercrime and other frauds and exploits that can be done with a computer.


What are computer viruses similar to?

Biological viruses.


What are the species of computer viruses?

The types of computer viruses are the virus, the worm and the Trojan horse.


What are facts about computer viruses?

It is 6,000 new computer viruses are released every month


Does hot-mail give your computer viruses?

no hotmail doesnt give you viruses it just a site to chat unless your computer has viruses.

Trending Questions
For about a year what network's nightly news show featured a computer generated globe that was spinning in the wrong direction until a sharp-eyed viewer wrote to Tom Brokaw? Who is Hargyo Tri Nugroho? In Word Which options on the menu would you choose to display the window? What happens when you add more text to a paragraph that is surrounded by a border? What is the common abbreviation for Information Technology? Polly tried for a half an hour to get online. Her tablet could detect a signal which means that her wireless card was turned on. Her tablet also showed that the signal strength was strong. What should? What does a database system consist of? How do I connect a network switch to a wireless home network I want to connect more than the 4 wired PCs that are I am limited to on my wireless router and the PCs are in other parts of the house.? In this chapter a light bulb is used to demonstrate the binary concept used for computer storage and communication Give another example in everyday life to explain this binary concept Get creativ? How do you make a chordophone with recyclable materials? Servers are computers that provide resources to other computers called that are connected to the network? Why is market segmentation needed? What does 14kcs stand for? What is the technology that sends resistance to a device in response to a users action? How do i log out of origin? How much does the g1 phone cost? What do teenagers do most watch tv or surf internet? What is logical Field in a computer? Why don't all objects fall to the earth at the same velocity even though the acceleration? What is the difference between Full Duplex and Half Duplex communication?