answersLogoWhite

0

🚓

Computer Worms

A computer worm is a piece of software which can reproduce and spread itself. While not always harmful, computer worms often act like (and are often confused with) computer viruses. Questions about these types of programs belong here.

760 Questions

Why you need different number system when computer work on binary?

Different number systems are taught, for one, to let you understand the basic concepts. Most number systems, however, will seldom be used. If you work with computers, you will mainly need:

  • Base 10, because that is the system we commonly use in "real life".
  • Base 2, because that is the system used internally by computers.
  • Base 16, often used as a shortcut to express base 2 numbers.
  • Base 8 can also be used as such a shortcut, but it is not commonly used nowadays. Base 8 is mainly a relic from the past.

Can my computer get the aids virus?

Yes. However the AIDS computer virus is nothing like the Human AIDS virus. Your computer can not get the Human AIDS virus.

This computer virus was written in 1990, and affected .com files running on the DOS system.

What is stealth computer virus?

A virus that runs in the backround and installs itself without a warning.

Can narutospot put a virus on your computer?

Affirmative. Something connected with NarutoSpot has occasionally been shown to download a false Security Center. This looks nearly identical to the security center window that is part of Windows Vista and Windows 7. If you do not get this closed out IMMEDIATELY, it will automatically start "scanning" your computer. In reality what it is doing is infecting your computer with several copies of a nasty virus and adding root kits to your computer. Then it will inform you that virii have been detected and try to get you to pay for a "service" that supposedly removes the inffection, but which in reality does not. It is associated with a program called security which loads on startup and shows up on program manager. The virus will not allow you to shut it down or remove it through standard means one you have been infected.

What is the advantage of mycin system?

a mycin is used in medical science or in medical diagnos for identiflying all blood infections (infections like dangu, blood cancer HIV AIDS and many more blood related infections

Can a computer virus lie dormant?

An infection can occasionally lie dormant in the system information files used for system restore. Following removal of an infection, system restore should be disabled, thereby removing all of the files, and a new system restore point added manually.

How has computers affected technology?

computers have affected technology by helping us find the right answers or close to them it decreases chance of human error.

What is the definition for viral contagion?

An infectious disease resulting from direct or indirect contact between individuals or animals.

How do websites get infected with a virus?

There are many sources that can implement a virus onto the Internet, but one thing is definite, someone or something must've uploaded the virus onto a public area of the Internet and the virus is intelligent enough to install itself to your computer (whether it was intentional or not). Most of the time, the virus has the ability to duplicate itself onto several webpages. Once it gets onto a computer, it can attempt to spread itself throughout the local network and/or through removable data storage (eg. flash drives).

How can the threat of a computer virus be minimised?

Have a Firewall, Have 1 virus scanner, only go on sites you know are safe, never download anything unless you're 100% sure you know what it is

What is the importance of computers in marketing?

1.Computers allow you to create and send marketing materials instantly over Internet lines.

2.Computers allow you to create emails and deliver them to clients.

3.Computers allow you to do market research locally and overseas.

4.Computers allow you to instantly launch advertising campaigns.

5.Computers allow you to read sales data and market data feeds over real time.

Can computer desktop be affected by computer virus?

Absolutely yes..as long as it gets in contact with an infected device like flash disk, its on the internet.

What is the use of ram in the computer system?

RAM stands for Random Access Memory. It is a form of computer data storage, and stores all of your documents and files on the computer.

Does a worm on your computer require user interaction?

No. Worms are either spread via networks or through a Trojan. If the worm is spread through a Trojan, the installation program will usually contain an execution command to start the worm automatically. Worms that spread via networks have already been executed.

Who makes spybot?

Answer by Techsupport

SpyBot is used to detect and remove spyware from your computer. It has been rated as a good antiSpyware program by Consumer Reports.The scripts make the program easier to use with JAWS.