#Computer~Programming~Language!
(a) What is high level language and machine level language.
(b) What is python?
(c) How hackers send virus to our PCs?
(d) Difference between Ethical Hackers and Black Hat hackers.
(e) What are Hex Editors? Write its uses.
Attachments:
Answers
Answered by
85
Hey there! ☺️
Good Question. I love ♥ Computer Programming Language
⚛️HIGH LEVEL LANGUAGES⚛️
It is an advanced computer programming language that is not limited to one computer, designed for a specific job and is easier to understand. The main advantage of high level languages over low level languages is that they are easier to read, write and understand. e.g.' BASIC, C, FORTRAN, Java and Pascal.
⚛️MACHINE LANGUAGE⚛️
It comes under low level languages that are more arcane and difficult to understand. It is the only language understood by the computers. Sometimes, it referred to as machine code or object code or binary language It 13 a collection of binary digits (0 or 1) or bits that the computer reads and interprets.
________________________________________________
☣️PYTHON☣️
Python is a powerful multiparadigm pc programming language, optimized for programming productiveness, code readability and program quality .It's used for each net development and program progress which can be realized simply in just a few days. Python is a general open source programming language. It is used for each standalone programs and scripting applications in a huge kind of domains. It is free portable, strong and is both slightly convenient and remarkably enjoyable to use.
______________________________________________
HOW DO HACKERS SEND VIRUS ☣️TO OUR PCs?
There are many ways for sending different viruses to computers and new ways are coming up as soon as the computer technology is upgrading. I have listed Top 11 ways of them.
#1.Email attachments.
It is the most common way of sending virus to computer. Viruses may be carried in attachments to email messages.
#2.Rogue Websites
A virus may be lurking on untrustworthy websites. Just clicking on them may infect your computer.
#3.Networks
A computer may be infected through a network which spreads from another computer connected to that same network. Keeping the networks antivirus software updated can help the situation.
#4.Infected Boot disks
A virus can be spread if an infected disk is in your hard drive and you attempt to restart. Always know the origin of any media you use with your computer system.
#5.Phishing Schemes.
Phishing schemes are attempts to get your personal information from you through email messages pretending to be legitimate websites. When you visit these sites, spyware, adware and viruses are automatically installed on your computer.
#6.Infected Software.
Freeware or shareware may infect your computer system. Only download from trusted sites.
#7.Hackers.
Hackers are people that purposefully create destructive programmes and processes to damage computer systems. The best way to protect yourself is to have a firewall and up to date antivirus software installed at all time.
#8.Instant Messaging
Hackers see IM as an easy way to get people to click on links. Only chat with people you know and don't follow links you don't recognize.
#9.Fake Anti Virus Software
Only download antivirus programes from trusted sites or from websites that you know are completely legit.
#10. Mobile Devices
When plugged in peripheral devices into your computer be sure that your antivirus software is up to date to block any virus that may installed when you plug in your device for the first time.
#11.Friends and Relatives
Viruses may come from family and friend's email attachments or using social media sites. If you get an attachment with a .exe or .dll extension. DO NOT open it.
Studying how computer viruses unfold is the best method we are able to put an finish to their reign of terror on-line. It is just with the proper talents and the pleasant antivirus program that internet users in all places can beat online bugs for good.
_______________________________________________
⭐️ ETHICAL HACKERS⭐️
Ethical hackers are security professionals who act defensively. They can test a network using black-box, white-box, or grey-box testing techniques. An ethical hacker report contains information on the hacking activities performed, network or system vulnerabilities discovered and countermeasures that should be implemented.
♠️ BLACK HAT HACKERS ♠️
Black hat hackers are the crackers or malicious hackers who choose to inflict damage on a target system. They can attack the network from a remote network, a remote dual-up network, or a local network, or through social engineering, stolen equipment, or physical access.
____________________________________
[ Continued to my another official account Μοιρασιά]
Good Question. I love ♥ Computer Programming Language
⚛️HIGH LEVEL LANGUAGES⚛️
It is an advanced computer programming language that is not limited to one computer, designed for a specific job and is easier to understand. The main advantage of high level languages over low level languages is that they are easier to read, write and understand. e.g.' BASIC, C, FORTRAN, Java and Pascal.
⚛️MACHINE LANGUAGE⚛️
It comes under low level languages that are more arcane and difficult to understand. It is the only language understood by the computers. Sometimes, it referred to as machine code or object code or binary language It 13 a collection of binary digits (0 or 1) or bits that the computer reads and interprets.
________________________________________________
☣️PYTHON☣️
Python is a powerful multiparadigm pc programming language, optimized for programming productiveness, code readability and program quality .It's used for each net development and program progress which can be realized simply in just a few days. Python is a general open source programming language. It is used for each standalone programs and scripting applications in a huge kind of domains. It is free portable, strong and is both slightly convenient and remarkably enjoyable to use.
______________________________________________
HOW DO HACKERS SEND VIRUS ☣️TO OUR PCs?
There are many ways for sending different viruses to computers and new ways are coming up as soon as the computer technology is upgrading. I have listed Top 11 ways of them.
#1.Email attachments.
It is the most common way of sending virus to computer. Viruses may be carried in attachments to email messages.
#2.Rogue Websites
A virus may be lurking on untrustworthy websites. Just clicking on them may infect your computer.
#3.Networks
A computer may be infected through a network which spreads from another computer connected to that same network. Keeping the networks antivirus software updated can help the situation.
#4.Infected Boot disks
A virus can be spread if an infected disk is in your hard drive and you attempt to restart. Always know the origin of any media you use with your computer system.
#5.Phishing Schemes.
Phishing schemes are attempts to get your personal information from you through email messages pretending to be legitimate websites. When you visit these sites, spyware, adware and viruses are automatically installed on your computer.
#6.Infected Software.
Freeware or shareware may infect your computer system. Only download from trusted sites.
#7.Hackers.
Hackers are people that purposefully create destructive programmes and processes to damage computer systems. The best way to protect yourself is to have a firewall and up to date antivirus software installed at all time.
#8.Instant Messaging
Hackers see IM as an easy way to get people to click on links. Only chat with people you know and don't follow links you don't recognize.
#9.Fake Anti Virus Software
Only download antivirus programes from trusted sites or from websites that you know are completely legit.
#10. Mobile Devices
When plugged in peripheral devices into your computer be sure that your antivirus software is up to date to block any virus that may installed when you plug in your device for the first time.
#11.Friends and Relatives
Viruses may come from family and friend's email attachments or using social media sites. If you get an attachment with a .exe or .dll extension. DO NOT open it.
Studying how computer viruses unfold is the best method we are able to put an finish to their reign of terror on-line. It is just with the proper talents and the pleasant antivirus program that internet users in all places can beat online bugs for good.
_______________________________________________
⭐️ ETHICAL HACKERS⭐️
Ethical hackers are security professionals who act defensively. They can test a network using black-box, white-box, or grey-box testing techniques. An ethical hacker report contains information on the hacking activities performed, network or system vulnerabilities discovered and countermeasures that should be implemented.
♠️ BLACK HAT HACKERS ♠️
Black hat hackers are the crackers or malicious hackers who choose to inflict damage on a target system. They can attack the network from a remote network, a remote dual-up network, or a local network, or through social engineering, stolen equipment, or physical access.
____________________________________
[ Continued to my another official account Μοιρασιά]
Attachments:
duragpalsingh:
Great!
Answered by
0
A high-level language (HLL) is a programming language such as C, FORTRAN, orPascal that enables a programmer to write programs that are more or less independent of a particular type of computer. Such languages are considered high-level because they are closer to human languages and further from machine languages.;
Machine Level language is the lowest-level programming language. Machine languages are the only languages understood by computers. Machine languages are almost impossible for humans to use because they consist entirely of numbers. Programmers, therefore, use either a high-level programming language or an assembly language. An assembly language contains the same instructions as a machine language, but the instructions and variables have names instead of being just numbers.
Python is an interpreted high-level programming language for general-purpose programming. Created by Guido van Rossum and first released in 1991, Python has a design philosophy that emphasizes code readability, notably using significant whitespace.
Hackers send viruses to the computer through emails,pen-drive and download files and if your account is hacked hacker can easily transfers viruses to our PCS.
A White hat hacker never use his skill for any illegal purpose. In fact, he always use his skill for protecting people from the black hat hackers and usually become computer or cyber security experts.
On the contrary the black hat or malicious hacker are bad guys and usually use their skill maliciously for personal gains like stealing credentials,credit cards and deface websites,etc.
A hex editor (or binary file editor or byte editor) is a type of computer program that allows for manipulation of the fundamental binary data that constitutes a computer file.Hex editors allow editing the raw data contents of a file, instead of other programs which attempt to interpret the data for you. Since a hex editor is used to edit binary files, they are sometimes called a binary editor or a binary file editor.
Machine Level language is the lowest-level programming language. Machine languages are the only languages understood by computers. Machine languages are almost impossible for humans to use because they consist entirely of numbers. Programmers, therefore, use either a high-level programming language or an assembly language. An assembly language contains the same instructions as a machine language, but the instructions and variables have names instead of being just numbers.
Python is an interpreted high-level programming language for general-purpose programming. Created by Guido van Rossum and first released in 1991, Python has a design philosophy that emphasizes code readability, notably using significant whitespace.
Hackers send viruses to the computer through emails,pen-drive and download files and if your account is hacked hacker can easily transfers viruses to our PCS.
A White hat hacker never use his skill for any illegal purpose. In fact, he always use his skill for protecting people from the black hat hackers and usually become computer or cyber security experts.
On the contrary the black hat or malicious hacker are bad guys and usually use their skill maliciously for personal gains like stealing credentials,credit cards and deface websites,etc.
A hex editor (or binary file editor or byte editor) is a type of computer program that allows for manipulation of the fundamental binary data that constitutes a computer file.Hex editors allow editing the raw data contents of a file, instead of other programs which attempt to interpret the data for you. Since a hex editor is used to edit binary files, they are sometimes called a binary editor or a binary file editor.
Similar questions
Social Sciences,
8 months ago
Hindi,
8 months ago
Math,
8 months ago
Computer Science,
1 year ago
Math,
1 year ago
Hindi,
1 year ago
Math,
1 year ago
Math,
1 year ago