.........are often delivered to a PC through an email attachment and are often designed to do harm.
The process of searching for known virus in the system is called?
A computer..........is a set of program instructions that can attach itself to a file,reproduce itself,and spread to other files.
Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as
Which of the following refers to much electricity and may cause a voltage surge_______
A computer virus that actively attacks an anti-virus program or programs in an effort to prevent detection is...
___ viruses are often transmitted by a floppy disk left in the floppy disk dirve
It is a program designed to destroy data on your computer, which can travel to infect other computers. What is it called?
A program that neither replicates or copies itself, but does damage or compromises the security of the computer. Which 'Computer Virus' it is?
A computer virus normally attaches itself to another computer program known as a ________