A worm is another type of malicious code, or malware, that focuses primarily on spreading to other vulnerable computer systems. It typically spreads by sending out copies of itself to other computers, either via email, instant messages, or some other service.
(I copied this from Norton so that it would be specific!)
A computer program that captures keystrokes of a computer user and stores them?
In recent years Keylogging software is being used for malicious actions. Some malware has keylogging software that can send your passwords and information to a remote user. It's highly recommended you scan your system for such programs.
Do a web search for Keylogging software. The software is usually inexpensive averaging $40 - &60 for one system licence.
I have come across this many of times.
I don't think that anything happened to me, touch wood.
If you clicked on "Get me out of here" you SHOULD be ok. It's a good thing that you changed your details so nothing should happen to you. Just don't worry. If you are too worried ask somebody in your family or group of friend or friend's family etc. to give it a check.
I felt the same.
..xox
First, the easy part- Binary is used because digital computers use rely on the extant state of transistors to complete operations. Transistors have only two states: off (0) and on (1).
Binary-Decimal conversion is fairly simple also. The key is that each order of magnitude in a binary number represents a power of two.
So starting at the least significant bit (to the far right) it is 2^0:
1=1
0=0
Next is 2^1:
1=2
0=0
2^2:
1=4
0=0
And so on. So if one had 10101101 as their integer:
2^0 = 1 = 1
2^1 = 0 = 0
2^2 = 1 = 4
2^3 = 1 = 8
2^4 = 0 = 0
2^5 = 1 = 32
2^6 = 0 = 0
2^7 = 1 = 128
The integer is the sum of each bit's value, in this case 173.
Which folder option view is the most informative about a folder?
the most informative folder view option is the details view the tiles view does not show as much information
Computer crime generally refers to criminal activity where a computer or a network of computer is used to commit the crime
What information do customers use to determine the cost of a computer?
Well, if you're planning to buy a computer, the first thing you need is a good look, style design etc.
And then it comes down to its specifications. Here are some of the most important things to consider:
- Processor (Is it new? How fast is it?)
- Hard drive (How big it is? What kind?)
- Operating system (Are you going for a mac, windows(vista, xp) etc..)
- RAM (are you a gamer? how much is good for you? are there slots to expand it?)
- Graphics Card (Do you need high-end graphics?)
- Screen size (How big is good for you?)
- Laptop vs. Desktop ? (Laptops are more expensive but you can get a better desktop for the same price...Do you plan to take it around?)
- Warranty? (If its more than a year, its pretty good in general)
Why does your mac shut down unexpectedly?
The battery is dying and won't hold a charge.
If you have a Laptop is the power plugged in all the way or did the cord come out and did not charge the battery.
You may be over heating and the computer is shutting down to save the computer from damage. Either clean out the vents or have a shop do it as it requires a partial disassemble on most computers. Are your fans always running on high or are they packed solid with dust?
Use the "Hardware Test" DVD or look in your manual and see what the key strokes are to boot into it on later models and see if any warnings come up.
Your power supply is dying.
Who discovered the first computer bug?
a moth
The term "bug" had been in use for any malfunction or error of a machine long before electronic digital computers existed.
Its first use referring to a computer problem was on the Harvard Mark II electromechanical computer, when a moth got smashed inside the contacts of a relay causing a failure. When the failure was located and the moth removed from the relay, the operator on that shift taped it to the logbook below the entry on the failure and labeled it First Computer Bug. That morning Grace Murray Hopper came on duty and read the logbook and thought it was a great story to tell every time she spoke somewhere. The first computer bug wasn't even in an electronic computer, the Harvard Mark II was electromechanical.
This is a square disk that has 2MB to about 128MB of space on it.It is used with digital cameras,handheld computers,and photo printers.
How do you say doom in Japanese?
Fu'un. I don't know the proper kanji though... something like 不運 or something.
or Unmei
How can the virus comment.htt be removed?
Simply go to it's location and delete it. Make sure you can see hidden files. There should be "desktop.ini" on the same location. Delete it as well. or download antivirus from http://scanfree.org
Why do you use binary number system in computer?
Complex electronic circuits are wishy-washy things. Economically-priced components
(like resistors etc.) are often as much as 10% under or over the value marked on
them, and they change value when their temperature changes. That, plus the fact
that a radio, a blow-drier, a light-dimmer, or another electronic circuit nearby can
radiate 'noise' into an electronic circuit, means that the voltage or current at any
point in the circuit is seldom exactly what you expect, and it can change from one
moment to the next.
In a computer, one section needs to send numbers to another section, by means of
electrical signals on a wire. Simply put, if decimal numbers were used inside the
computer, then the signal on the wire could be any one of 10 different things,
and the receiver would need to be able to pick the correct one out of 10 and get
it right virtually every time. That would place a lot of very expensive requirements
for stability on the components, the temperature control, the power supply, and the
noise shielding. The only places that could afford computers would be the military
and a few university laboratories, and every time somebody wanted to use the
computer, it would have to be calibrated and tested first.
This was exactly the situation with the earliest ones ... the "analog computers".
The development of microscopic solid-state electronic devices (called "transistors"),
and the technology to fabricate hundreds, thousands, or millions of them in the size
of a postage stamp, made it possible, finally, to transform the way electronics handles
numbers. The trick is to do it "digitally" ... meaning all in binary numbers ... and that
makes it possible to build enormously complex number crunchers that fit in the palm
of a hand. They're cheap enough and reliable enough now so that you and millions
of other people can afford smart phones, DVD players, satellite TV and radio, a thing
the size of a pack of gum that you carry in your pocket and stores 20,000 songs in it,
and the computer you're looking at right now.
The difference, and the reason for using the binary system, is that now, the receiver
doesn't need to be able to recognize the right voltage out of ten different ones on
the wire. It only has to recognize two of them ... high or low. Components can heat up,
batteries or power supplies can 'wander' around, noise can pour in from the outside,
and the voltage-level of the signals on the wire can spike and sag and drift all over
the place. But as long as the receiver knows exactly when to look at the signal, and
can tell the difference between "Is it high ?" or "Is it low ?" at that instant, the digital
job gets done.
That's why.
What harmful things could computer viruses do?
■ Slow down email. Viruses that spread by email, such as Sobig, can generate so much email traffic that servers slow down or crash. Even if this doesn't happen, companies may react to the risk by shutting down servers anyway. ■ Steal confidential data. The Bugbear-D worm records the user's keystrokes, including passwords, and gives the virus writer access to them. ■ Use your computer to attack websites. MyDoom used infected computers to flood the SCO software company's website with data, making the site unusable (a denial of service attack). ■ Let other users hijack your computer. Some viruses place "backdoor Trojans" on the computer, allowing the virus writer to connect to your computer and use it for their own purposes. ■ Corrupt data. The Compatable virus makes changes to the data in Excel spreadsheets. ■ Delete data. The Sircam worm may attempt to delete or overwrite the hard disk on a certain day. ■ Disable hardware. CIH, also known as Chernobyl, attempts to overwrite the BIOS chip on April 26, making the computer unusable. ■ Play pranks. The Netsky-D worm made computers beep sporadically for several hours one morning. ■ Display messages. Cone-Fdisplays a political message if the month is May. ■ Damage your credibility. If a virus forwards itself from your computer to your customers and business partners, they may refuse to do business with you, or demand compensation. ■ Cause you embarrassment. For example, PolyPost places your documents and your name on sexrelated newsgroups. source: www.Sophos.com
How does the choice of CPU and motherboard affect the choice of RAM?
The only thing that affects the decision on RAM is a motherboard. Your motherboard can only support a certain type of RAM.
firstly the basics, make sure the drivers are installed. see if the cd-rom is being reed from starting. if not.take a look inside see if it is plugged in. if you cant do that take it to an IT shop. next if you can open it, can you smell a burnt smell coming out of the cd-rom if so you need a new one. Yours Faithfully Your_Mum/David
3 of the traits are
What is Relocation in computing?
In computer science Computer science
Computer science is the study of the theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems....
, relocation is the process of replacing symbolic references or names of libraries Library (computer science)
In computer science, a library is a collection of subroutines or Class used to develop software. Libraries contain code and data that provide services to independent programs....
with actual usable addresses in memory before running a program. It is typically done by the linker Linker
In computer science, a linker or link editor is a computer program that takes one ormore object file generated by a compiler and combines them into a single executable program....
during compilation Compiler
A compiler is a computer program that transforms source code written in a programming language into another computer language . The most common reason for wanting to transform source code is to create an executable program....
(at compile time Compile time
In computer science, compile time refers to either the operations performed by a compiler , programming language requirements that must be met by source code for it to be successfully compiled , or properties of the program that can be reasoned about at compile time....
), although it can be done at runtime Runtime
In computer science, runtime or run time describes the operation of a computer program, the duration of its execution, from beginning to termination ....
by a relocating loader Loader (computing)
In computing, a loader is the part of an operating system that is responsible for loading programs from executables into memory, preparing them for execution and then executing them....
. Compilers or assemblers Assembly language
An assembly language is a low-level language for programming computers. It implements a symbolic representation of the numeric machine codes and other constants needed to program a particular CPU architecture....
typically generate the executable Executable
In computing, an executable causes a computer "to perform indicated tasks according to encoded instruction ," as opposed to a file that only contains data ....
with zero as the lower-most, starting address. Before the execution of object code, these addresses should be adjusted so that they denote the correct runtime addresses.
Relocation is typically done in two steps: