answersLogoWhite

0

Logic Bomb

They go off when certain conditions are met.

One example being a certain date or time.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What is a virus that is triggered when certain conditions are met?

A Logic Bomb


Are viruses that are triggered by the passage of time or on a certain date?

Logic bomb


What virus does not cause damage until a certain date?

it is a time-bomb virus


A logic bomb is normally triggered by the passage of time or on a certain date.?

False


Is a logic bomb normally triggered by the passage of time or on a certain date?

False


Is a logic bomb normally triggered by the passages of time or on a certain date?

False


What causes the reactivation of the virus?

It is believed that the reactivation is triggered when the immune system becomes weakened as a result of age, stress, fatigue , certain medications, chemotherapy, or diseases such as cancer or HIV.


How was the big bang triggered?

It is currently quite certain that a Big Bang DID occur. It is NOT known what triggered it.


Explain about computer viruses time bomb?

the virus is in effect at a certain time or date that up there and it projects multiple windows of desktop items, previous visited sites, and mostly hundreds of blank notepad windows the ram overloads and the computer blacks out (ram is fried buy new one)


Right Media virus deletion?

Right Media virus deletion can sometimes be accomplished by doing what is called a system recovery on the computer. It deletes any installations that occurred after a certain date. A person can set any date they would like to do a system restore because the computer time stamps everything.


How are the lysogenic and lytic cycles different?

causes Disease


What is the name for the action carried out by a virus when it is activated?

The action carried out by a virus when it is activated is typically referred to as executing or running. This involves the virus code being triggered and performing its intended functions, which could include replicating itself, corrupting files, or stealing data.