Thank you for the details of the three types of computer viruses!!

Updated on technology 2024-02-10
4 answers
  1. Anonymous users2024-02-06

    a.No bodily injury to computer operators.

    b.It can cause infection and illness in all computer operators.

    c.It can cause infection and illness in some computer operators.

    d.It infects all computer operators with the virus, but it does not cause illness.

    Correct Answer: a

  2. Anonymous users2024-02-05

    Answer]: A computer virus refers to a set of computer instructions or programs that are compiled or inserted into a computer program that destroy computer functions and data, affect the use of the computer and can replicate itself. The computer virus itself is destructive and contagious, but its essence is still the order of the bird's picking**, which will not affect the health of the human body, so options B, C and D can be directly excluded.

  3. Anonymous users2024-02-04

    5What is a computer virus? Explain the difference between virus Trojans (14 points) Chat about the country of posting [minus superscript[.]

    1. Computer virus (computer virus) is a set of computer instructions or programs inserted by the compiler in the computer program to destroy computer functions or data, affect the use of the computer, and can self-replicate. Trojan Horse, ** in the story of the ancient Greek myth "Homer's Epic" "Trojan Horse Slaughter". The so-called Trojan horse now refers to those computer programs that appear to be useful software, but are actually intended to endanger computer security and cause serious breakage.

    2. Different characteristics: Computer viruses are transmissible, hidden, infectious, latent, exciting, expressive or destructive. The life cycle of a computer virus: development period, infectious period, incubation period, attack period, discovery period, digestion period, and extinction period.

    Trojans are deceptive files, a remote-controlled-based hacking tool that is stealthy and non-authorized. Extended data Trojans are ostensibly harmless and even appealing to unsuspecting users, often hiding in games or graphics software, but they hide malicious intent. Once these seemingly friendly programs are running, they can perform illegal actions such as deleting files or formatting the hard drive.

    A complete Trojan is generally composed of two parts: one on the server side and the other on the controller side. "Trojan horse" refers to the installation of the Trojan horse's server-side program, if your computer is installed server-side program, then the person with the corresponding client can control your computer through the network.

    Get away with murder. At this time, the various files and programs on your computer, as well as the passwords used on your computer, are not secure.

  4. Anonymous users2024-02-03

    Summary. Kiss <>

    Your question has been received, I'll answer it for you, it will take a little time to type, please wait a minute.

    5What is a computer virus? Explain the difference between virus Trojans (14 points) Chat about the country of posting [minus the superscript [kiss<>

    Your question has been received, I'll answer it for you, it will take a little time to type, please wait a minute.

    Hello, computer virus refers to a set of calculations that can affect the use of the computer and self-replicate the data inserted by the compiler in the computer program. The virus has the characteristics of transmissibility, concealment, and infection.

    A Trojan horse is a computer program that appears to be useful but is actually intended to compromise computer security and cause serious damage. It is concealed and unauthorized. The biggest difference between a Trojan and a virus is that a Trojan is not contagious, and it mainly attracts users through its own disguise.

    To put it simply, viruses destroy bad information, and Trojans steal information.

    The biggest difference between a Trojan horse and a virus is that a Trojan horse is not contagious, and it mainly attracts users to perform it through its own disguise. To put it simply, the Chang pants virus destroys information, and the Trojan horse steals and makes trouble to get information.

Related questions
11 answers2024-02-10

1. As long as you humbly ask for advice and study diligently, you can also do a good job in accounting by "becoming a monk halfway". >>>More

5 answers2024-02-10

This kind of thing can't be said.,It's best to go to the computer more by yourself.,Look at the motherboard workmanship、Materials、BIOS settings,After a long time,You'll have your own opinions.。

2 answers2024-02-10

In the afternoon, the Southern Research Institute issued a batch of offers for sales and service positions, and the sales and services seemed to be excellent and school recruitment, and in the evening, the Southern Research Institute sent a batch of R&D posts: 27 finally received a recruitment text message, so that after the National Day, I went to the scene to sign two or three parties, and there was no specific position and salary in the letter of intent, so the landlord now does not know which department he was hired to. As for the midtest, I don't think you need to care, I didn't have a word under the official website before, and then today I went directly to the third step to confirm the letter of intent, so as long as the old iron without words didn't receive the notice of retest, don't worry. >>>More

14 answers2024-02-10

There are a lot of tutorials on the Internet or the kind of professional forums You are just starting to get in touch It is best to look at the basics first Don't need to study so advanced There is usually more practice and more practice You can't just read books and take your time Technology is accumulated little by little I wish you a good day**!