ACTIVITY -2 CHAPTER 3- COMPUTER VIRUS FILL IN THE BLANKS a) A (HIV) cannot spread without an aid b) Viruses that project themselves as antivirus programs are ----------- c) Viruses get ---------------- immediately or remain -------------for months. d) A ---------------appears to be performing a useful function whereas in reality it is performing an illegal function. e) -------------- disrupts network by fast replication. f) To protect oneself against virus attacks, frequent -------- of disk files must be taken. g) Auto update feature of antivirus program allows them to download ---------of new viruses. h) Antivirus software includes a set of definitions of (virus definitions) i) Elk Cloner was created (Skrenta) j) The first PC virus was called (Creeper system) II) NAME THEM i) A parasite that attaches itself to host software and destroys Computers (Copied Programs) ii) Viruses that dupe people in believing that their system is infected and installing viruses as antivirus vaccines ----------- iii) An innocent looking computer program that is actually a threat -------------- iv) It does not replicate itself ------------- v) A malware that chokes communication lines through self- replication ------------ vi) A program that checks incoming files for viruses ----------- vii) Malicious software in short (malicious software) viii) Virus created by Rich Skrenta ------------ ix) Virus developed in Pakistan (Brain) x) They take up the memory of legitimate programs and slow the system down ----------------
Answers
Answered by
8
Answer:
ACTIVITY -2 CHAPTER 3- COMPUTER VIRUS FILL IN THE BLANKS a) A (HIV) cannot spread without an aid b) Viruses that project themselves as antivirus programs are ----------- c) Viruses get ---------------- immediately or remain -------------for months. d) A ---------------appears to be performing a useful function whereas in reality it is performing an illegal function. e) -------------- disrupts network by fast replication. f)
Answered by
6
Answer:
r cthgngibbuubih
Similar questions