A __________ virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.
As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a __________ file.
Before a computer can store a file on a disk, CD, or DVD, the storage medium must be _________.
A __________ virus mutates to escape detection by changing its signature.
When you save a file, your PC's operating system looks at the __________ to see which clusters are empty.
The main directory of a disk is referred to as the ____root______ directory.
A virus __________ is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.
A file ___________ is an optional file identifier that is separated from the main filename by a period, as in Paint.exe
The ____The Registry______ is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.
Unlike a virus, which is designed to spread from file to file, a ______worm____ is designed to spread from computer to computer.
A _anitvirus_ virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.
As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a _scattered_ file.
Before a computer can store a file on a disk, CD, or DVD, the storage medium must be _working_.
A _mutating_ virus mutates to escape detection by changing its signature.
When you save a file, your PC's operating system looks at the _MEGAHURTS_ to see which clusters are empty.
The main directory of a disk is referred to as the _main_root_dir_ directory.
A virus _footprint_ is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.
A file _.exe_ is an optional file identifier that is separated from the main filename by a period, as in Paint.exe
The _lol_The Registry_wut_ is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.
Unlike a virus, which is designed to spread from file to file, a _earth_worm_trojan_ is designed to spread from computer to computer.
Name:
Anonymous2008-02-20 10:38
A PENIS virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.
As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a PENIS file.
Before a computer can store a file on a disk, CD, or DVD, the storage medium must be PENIS.
A PENIS virus mutates to escape detection by changing its signature.
When you save a file, your PC's operating system looks at the PENIS to see which clusters are empty.
The main directory of a disk is referred to as the PENIS root PENIS directory.
A virus PENIS is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.
A file PENIS is an optional file identifier that is separated from the main filename by a period, as in Paint.exe
The PENIS The Registry PENIS is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.
Unlike a virus, which is designed to spread from file to file, a PENIS worm PENIS is designed to spread from computer to computer.
You wouldn't happen to be in CIS1 online are you because I got the same questions from my chapter 4 assignment 5.2 homework? lol
Name:
Anonymous2008-02-21 2:15
>>7
lol ya i am with hoggan. what the ef, someone actually from my class is on here. weird, kinda late since i needed the answers.
i totally failed that midterm today though. total fail.
A naughty virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.
As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a Windows system file.
Before a computer can store a file on a disk, CD, or DVD, the storage medium must be raped vigorously.
A flu virus mutates to escape detection by changing its signature.
When you save a file, your PC's operating system looks at the clusters to see which clusters are empty.
The main directory of a disk is referred to as the ergo your wrong bitch directory.
A virus program is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.
A file enumeration is an optional file identifier that is separated from the main filename by a period, as in Paint.exe
The system32 is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.
Unlike a virus, which is designed to spread from file to file, a nigger is designed to spread from computer to computer.
Name:
Anonymous2008-03-30 13:24
A AIDS virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.
As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a party file.
Before a computer can store a file on a disk, CD, or DVD, the storage medium must be plugged in.
A fraud virus mutates to escape detection by changing its signature.
When you save a file, your PC's operating system looks at the clusters to see which clusters are empty.
The main directory of a disk is referred to as the root root root directory.
A virus fingerprint is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.
A file identifier is an optional file identifier that is separated from the main filename by a period, as in Paint.exe
The The The Registry Registry is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.
Unlike a virus, which is designed to spread from file to file, a tape worm worm is designed to spread from computer to computer.
Name:
Anonymous2008-03-30 21:09
A trojan virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.
As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a fragmented file.
Before a computer can store a file on a disk, CD, or DVD, the storage medium must be initialized.
A polymorphic virus mutates to escape detection by changing its signature.
When you save a file, your PC's operating system looks at the file allocation table (FAT) to see which clusters are empty.
The main directory of a disk is referred to as the root directory.
A virus footprint? is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.
A file extension is an optional file identifier that is separated from the main filename by a period, as in Paint.exe
The registry is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.
Unlike a virus, which is designed to spread from file to file, a worm is designed to spread from computer to computer.