Explain how virus,worms,trojan horses ar vulnerable to a system.
Answers
Answered by
1
When an infected file is executed or a computer is booted from an infected disk, the concealed virus is executed. ... In addition, many viruses also perform a trigger event, such as displaying a message on a certain date, or deleting files after the infected program is run a certain number of times.
this is your answer bro.
this is your answer bro.
dam7trivedi:
it's ok bro
Similar questions
Math,
7 months ago
Math,
7 months ago
Computer Science,
7 months ago
Social Sciences,
1 year ago
Math,
1 year ago