Computer Science, asked by Darkwarrior905, 1 month ago

is a program that damages or compromises the security of
someone emailing it to you. It may arrive in the form of a jo
is a computer virus that actively attacks an anti-virus prog
programs in an effort to prevent detection
5 This Trojan horse was initially a virus hoax but later become
6. These are parasitic computer programs that replicate
program files. They can create copies on the same comp
computers via a network. They often spread via IRC (Inter
7. in 1987, one of the most common viruses was detected
Her both FYF and CON files and deleting any pro​

Answers

Answered by atharvv963
0

Answer:

you can use trogen horse

Explanation:

Similar questions