Computer Science, asked by amritagarg507, 7 months ago

………………………………………. are special characters like +, -, >, <, /, *, ^, % that specify the arithmetic calculations to be carried out. *
1 point
Your answer
 
This is a required question
14. …………………………. works where the total is to appear at the end of the column or row of data. *
1 point
Your answer
 
This is a required question
15. A formula is an expression which …………………. the value of a cell. *
1 point

16. What is the use of IF ( ) function? *
1 point

17. Write the name of first virus detected on ARPANET. *
1 point

18. What do you mean by the term firewall? *
1 point

19. …………………………………….virus infects files that contain executable code like .exe, .com, .dll, etc. *
1 point
Your answer
 
This is a required question
20. ……………………..are destructive software program designed to spread through computer networks. *​

Answers

Answered by topwriters
0

Sum, Calculates, conditional calculation, Creeper Virus, File Infector, Worms

Explanation:

14. Sum works where the total is to appear at the end of the column or row of data. *

15. A formula is an expression which calculates the value of a cell. *

16. What is the use of IF ( ) function? *

  • Calculation based on a condition. Example: Count if greater than 10 will give the count of entries more than 10 and ignore the lesser entries.

17. Write the name of first virus detected on ARPANET. *

  • The Creeper virus was first virus detected on ARPANET

18. What do you mean by the term firewall? *

  • A firewall is a network security mechanism that tracks and manages incoming and outgoing network traffic in compliance with defined safety laws. A firewall typically creates a buffer between a trustworthy internal network and an external network like Internet that is not trustable.

19. …………………………………….virus infects files that contain executable code like .exe, .com, .dll, etc. *

  • File Infector viruses infect files with their program code. These viruses attack executable code like .com, .exe, .dll files, etc. They can also infect other files when a program is running from a floppy, hard drive, or network connection. These viruses are resident on memory. Any uninfected executable file that runs gets infected after the memory becomes infected. Examples of infector viruses are Jerusalem and Cascade.

20. ……………………..are destructive software program designed to spread through computer networks. *​

  • Worms are destructive software program designed to spread through computer networks. These programs can replicate themselves from system to system without the use of a host file. Worms generally exist inside other files like a Word doc or an Excel file. The worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. Example of worm: PrettyPark.
Similar questions