History, asked by ayandutta97, 6 months ago

B. ASR
pa
C D
Trojan Horse
d. Yakker
Worm
The action which a virus perform
A program which reproduces itself and may attach to other programs; it may create copless
it may damage or corrupt data, change data.
A person who tries to break into people's computer systems.
3. A program or file that a user allows or invites into his or her system.
A program that is put in someone's computer to secretly gather information about the
A program that detects, prevents and removes malware.
5 A database of viruses is called
d. Infection
Tick) the correct answer.
7.
Virus
Packer
Worm
spread it
Worm
b. MacAfee
Hacker
d. Skyware
Tracker
Spyware
b. Trojan Horse
d. Malicious
Spyware
d. Loader
Payload
Virus
b. Antivirus
te True or False​

Answers

Answered by Riya94309
1

Answer:

sorry don't no this question

Answered by AvishiShivi
1

Answer:

cant understand yet .....that what you want to write

Explanation:

just follow me ........then I can try more focus to do the question

Similar questions