Computer Science, asked by suman12121718, 7 months ago

Exercise
Fill in the blanks.
1.)A worm cannot............
itself to other programs.
2.)A Trojan horse malware is full of...............
3.)Spam is a collection of unwanted................
4)..................appear on your computer as advertisements.
5) Avoid using...................
disk in your computer.

Answers

Answered by prince2220karan
2

Explanation:

1.Computer worms are similar to viruses in that they replicate functional copies ofthemselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate.

2.A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

please mark like and follow me and Brainlist also

Answered by joshivijaylaxmi909
0

Answer:

attach

trickely

email

malware

infect

Similar questions