Exercise
Fill in the blanks.
1.)A worm cannot............
itself to other programs.
2.)A Trojan horse malware is full of...............
3.)Spam is a collection of unwanted................
4)..................appear on your computer as advertisements.
5) Avoid using...................
disk in your computer.
Answers
Answered by
2
Explanation:
1.Computer worms are similar to viruses in that they replicate functional copies ofthemselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate.
2.A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.
please mark like and follow me and Brainlist also
Answered by
0
Answer:
attach
trickely
malware
infect
Similar questions