answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

When the user loads a program it is copied into before it is run?

RAM

It depends on the computer system being used. Traditionally an executable program would be copied in its entirety from its storage media (disk, diskette, tape, SD card, USB device, network storage) into memory (also called RAM for Random Access Memory). If it already is in a high speed ROM (read only memory) it might be executed directly from there or it might still be copied into RAM for execution. It depends on the capabilities of the rest of the hardware.

Systems with a swapping area might copy the program to the swap area and flag it for execution. When its turn comes, part of it are loaded into memory as needed and run.

Other systems don't even do that. They can just flag the program location on the disk drive as ready run. When its turn arrives, the needed parts of the program are copied to memory and run.

What is a group of worms called?

A group of worms is commonly referred to as a "cluster" or "bunch."

How do you read com file?

You really can't unless you get a decompiler. A .com file is a computer program that has been 'compiled' and converted into machine language. What you want is the 'source code' that was used to create the .com file by running it through a compiler.

What number system does a computer use that is on?

Computers are not smart They only know 0 and 1 or binary states or true or false. this language is known as machine language

What can cure ring worms on skin?

Try Usind Nail Polish and then throw away some of the things that you touched also try using plastic mattress covers Good Luck

Describe a computer worm?

A worm is another type of malicious code, or malware, that focuses primarily on spreading to other vulnerable computer systems. It typically spreads by sending out copies of itself to other computers, either via email, instant messages, or some other service.

(I copied this from Norton so that it would be specific!)

A computer program that captures keystrokes of a computer user and stores them?

Answer:There are several Keylogging programs on the internet available to download. Most all of them have the minimum capabilities of recording both keystrokes and screenshots. The software is typically used to keep track of web sites children visit, and conversations they have.

In recent years Keylogging software is being used for malicious actions. Some malware has keylogging software that can send your passwords and information to a remote user. It's highly recommended you scan your system for such programs.

Do a web search for Keylogging software. The software is usually inexpensive averaging $40 - &60 for one system licence.

A bebo virus associating netlog came to me when on bebo. I stupidly clicked I didnt want to continue when a tab came up. I changed ALL my bebo details but am still worried. Has anyone come across this?

I have come across this many of times.

I don't think that anything happened to me, touch wood.

If you clicked on "Get me out of here" you SHOULD be ok. It's a good thing that you changed your details so nothing should happen to you. Just don't worry. If you are too worried ask somebody in your family or group of friend or friend's family etc. to give it a check.

I felt the same.

..xox

Explain how by use of the binary system positive integer numbers are stored on digital computer and explain why binary is used rather than any other base system?

First, the easy part- Binary is used because digital computers use rely on the extant state of transistors to complete operations. Transistors have only two states: off (0) and on (1).

Binary-Decimal conversion is fairly simple also. The key is that each order of magnitude in a binary number represents a power of two.

So starting at the least significant bit (to the far right) it is 2^0:

1=1

0=0

Next is 2^1:

1=2

0=0

2^2:

1=4

0=0

And so on. So if one had 10101101 as their integer:

2^0 = 1 = 1

2^1 = 0 = 0

2^2 = 1 = 4

2^3 = 1 = 8

2^4 = 0 = 0

2^5 = 1 = 32

2^6 = 0 = 0

2^7 = 1 = 128

The integer is the sum of each bit's value, in this case 173.

Which folder option view is the most informative about a folder?

the most informative folder view option is the details view the tiles view does not show as much information

Define computer crime?

Computer crime generally refers to criminal activity where a computer or a network of computer is used to commit the crime

What information do customers use to determine the cost of a computer?

Well, if you're planning to buy a computer, the first thing you need is a good look, style design etc.

And then it comes down to its specifications. Here are some of the most important things to consider:

- Processor (Is it new? How fast is it?)

- Hard drive (How big it is? What kind?)

- Operating system (Are you going for a mac, windows(vista, xp) etc..)

- RAM (are you a gamer? how much is good for you? are there slots to expand it?)

- Graphics Card (Do you need high-end graphics?)

- Screen size (How big is good for you?)

- Laptop vs. Desktop ? (Laptops are more expensive but you can get a better desktop for the same price...Do you plan to take it around?)

- Warranty? (If its more than a year, its pretty good in general)

Why does your mac shut down unexpectedly?

The battery is dying and won't hold a charge.

If you have a Laptop is the power plugged in all the way or did the cord come out and did not charge the battery.

You may be over heating and the computer is shutting down to save the computer from damage. Either clean out the vents or have a shop do it as it requires a partial disassemble on most computers. Are your fans always running on high or are they packed solid with dust?

Use the "Hardware Test" DVD or look in your manual and see what the key strokes are to boot into it on later models and see if any warnings come up.

Your power supply is dying.

Who discovered the first computer bug?

a moth

The term "bug" had been in use for any malfunction or error of a machine long before electronic digital computers existed.

Its first use referring to a computer problem was on the Harvard Mark II electromechanical computer, when a moth got smashed inside the contacts of a relay causing a failure. When the failure was located and the moth removed from the relay, the operator on that shift taped it to the logbook below the entry on the failure and labeled it First Computer Bug. That morning Grace Murray Hopper came on duty and read the logbook and thought it was a great story to tell every time she spoke somewhere. The first computer bug wasn't even in an electronic computer, the Harvard Mark II was electromechanical.