Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Wanna do my homework?

Name: Anonymous 2008-02-20 2:37

A __________ virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.

As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a __________ file.

Before a computer can store a file on a disk, CD, or DVD, the storage medium must be _________.

A __________ virus mutates to escape detection by changing its signature.

When you save a file, your PC's operating system looks at the __________ to see which clusters are empty.

The main directory of a disk is referred to as the ____root______ directory.

A virus __________ is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.

A file ___________ is an optional file identifier that is separated from the main filename by a period, as in Paint.exe

The ____The Registry______ is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.

Unlike a virus, which is designed to spread from file to file, a ______worm____ is designed to spread from computer to computer.

Name: Anonymous 2008-02-20 3:30

Wanna do my homework?
no. go away.

Name: Anonymous 2008-02-20 6:41

A _anitvirus_ virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.

As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a _scattered_ file.

Before a computer can store a file on a disk, CD, or DVD, the storage medium must be _working_.

A _mutating_ virus mutates to escape detection by changing its signature.

When you save a file, your PC's operating system looks at the _MEGAHURTS_ to see which clusters are empty.

The main directory of a disk is referred to as the _main_root_dir_ directory.

A virus _footprint_ is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.

A file _.exe_ is an optional file identifier that is separated from the main filename by a period, as in Paint.exe

The _lol_The Registry_wut_ is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.

Unlike a virus, which is designed to spread from file to file, a _earth_worm_trojan_ is designed to spread from computer to computer.

Name: Anonymous 2008-02-20 10:38

A PENIS virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.

As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a PENIS file.

Before a computer can store a file on a disk, CD, or DVD, the storage medium must be PENIS.

A PENIS virus mutates to escape detection by changing its signature.

When you save a file, your PC's operating system looks at the PENIS to see which clusters are empty.

The main directory of a disk is referred to as the PENIS root PENIS directory.

A virus PENIS is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.

A file PENIS is an optional file identifier that is separated from the main filename by a period, as in Paint.exe

The PENIS The Registry PENIS is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.

Unlike a virus, which is designed to spread from file to file, a PENIS worm PENIS is designed to spread from computer to computer.

Name: Anonymous 2008-02-20 11:16

Chapter 13?

Name: Anonymous 2008-02-20 22:50

>>5
no actually its Chapter 4, pages, 186 to 202.

Name: Anonymous 2008-02-20 23:04

You wouldn't happen to be in CIS1 online are you because I got the same questions from my chapter 4 assignment 5.2 homework? lol

Name: Anonymous 2008-02-21 2:15

>>7
lol ya i am with hoggan. what the ef, someone actually from my class is on here. weird, kinda late since i needed the answers.
i totally failed that midterm today though. total fail.

Name: Anonymous 2008-02-21 3:36

>>7
>>8
pame serson.

Name: Anonymous 2008-02-21 7:54

>>8
You don't deserve to graduate. As anything.

Name: Anonymous 2008-02-21 13:43

>>8
You fail it.

Name: Anonymous 2008-02-22 0:33

>>10
>>11
lol nerds getting mad. sorry im making more money than you already by cheating through college.

Name: Anonymous 2008-02-24 17:13

>>12
"online college?"

have fun with that

Name: Anonymous 2008-02-24 19:14

>>12
I doubt that very much. My name is Gerald J. Sussman and I am a respected computer scientist (God, I hate that word).

Name: Anonymous 2008-02-25 1:30

>>14
Forgot your tripcode.

Name: Anonymous 2008-02-25 1:57

>>15
how dare you question my auTHORATHAI!!!

Name: GJSussman !xpQSO2ECEY 2008-02-25 7:17

>>16
Obvious fake.

>>15
That I did.

Name: GJSussman!xpQSO2ECEY 2008-02-25 9:38

I R FAG

Name: Anonymous 2008-02-25 18:43

>>18
No shit. Especially since that tripcode is widely known.

Name: gdf 2008-03-25 22:49

dgggggggggggggggggggg

Name: Anonymous 2008-03-26 3:04

this are shitty madlibs

Name: Anonymous 2008-03-29 4:41

>>1
The answer to every question is "COCK".

Name: Anonymous 2008-03-30 1:41

Fucktards

Name: Anonymous 2008-03-30 10:28

A naughty virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.

As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a Windows system file.

Before a computer can store a file on a disk, CD, or DVD, the storage medium must be raped vigorously.

A flu virus mutates to escape detection by changing its signature.

When you save a file, your PC's operating system looks at the clusters to see which clusters are empty.

The main directory of a disk is referred to as the ergo your wrong bitch directory.

A virus program is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.

A file enumeration is an optional file identifier that is separated from the main filename by a period, as in Paint.exe

The system32 is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.

Unlike a virus, which is designed to spread from file to file, a nigger is designed to spread from computer to computer.

Name: Anonymous 2008-03-30 13:24

A AIDS virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.

As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a party file.

Before a computer can store a file on a disk, CD, or DVD, the storage medium must be plugged in.

A fraud virus mutates to escape detection by changing its signature.

When you save a file, your PC's operating system looks at the clusters to see which clusters are empty.

The main directory of a disk is referred to as the root root root directory.

A virus fingerprint is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.

A file identifier is an optional file identifier that is separated from the main filename by a period, as in Paint.exe

The The The Registry Registry is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.

Unlike a virus, which is designed to spread from file to file, a tape worm worm is designed to spread from computer to computer.

Name: Anonymous 2008-03-30 21:09

A trojan virus is designed to attack antivirus software by deleting the files that contain virus descriptions, or corrupting the main executable virus program.

As the operating system writes files on a disk, part of the files sometimes become scattered all over the disk, and the file becomes known as a fragmented file.

Before a computer can store a file on a disk, CD, or DVD, the storage medium must be initialized.

A polymorphic virus mutates to escape detection by changing its signature.

When you save a file, your PC's operating system looks at the file allocation table (FAT) to see which clusters are empty.

The main directory of a disk is referred to as the root directory.

A virus footprint? is usually a section of the virus program, such as a unique series of instructions, that can be used to identify a known virus, much as a fingerprint is used to identify an individual.

A file extension is an optional file identifier that is separated from the main filename by a period, as in Paint.exe

The registry is an important group of files used by the Windows operating system to store configuration information about all of the devices and software installed on a computer system.

Unlike a virus, which is designed to spread from file to file, a worm is designed to spread from computer to computer.

Delivered.

Name: Anonymous 2008-03-30 21:11

>>26 here.

I just noticed something...

A file extension is an optional file identifier that is separated from the main filename by a period, as in Paint.exe.

optional file identifier

WTF.

Name: Anonymous 2008-03-31 5:22

>>27
in non shitty operating systems, yes.

Name: Anonymous 2008-03-31 6:38

DONT HELP HIM!!!

Name: Mervo_4_life 2008-03-31 8:20

holy bung hole

Name: adsa 2008-03-31 15:40

<span style="color: rgb(0, 0, 0); background-color: rgb(0, 0, 0);" class="spoiler" onmouseover="this.style.color='#FFF';" onmouseout="this.style.color=this.style.backgroundColor='#000'">twat</span>

Name: Anonymous 2008-03-31 23:15

The Annex is fucking awesome.

http://annex.wikia.com

Name: replica Graham 2010-01-03 13:45

Name: Concord watches 2010-01-06 2:27

<A href="http://www.patekphilippewatches.us/">replica watch</A><BR><A href="http://www.patekphilippewatches.us">cheap fake watches</A><BR><A href="http://www.patekphilippewatches.us/">watches replica</A><BR><A href="http://www.patekphilippewatches.us/">replica watches</A><BR><A href="http://www.patekphilippewatches.us">watches for sale</A><BR><A href="http://www.patekphilippewatches.us/Rolex/Day%20Date%20II/">Rolex Day-Date II watch for sale</A><BR><A href="http://www.patekphilippewatches.us/Maurice-Lacroix/">replica Maurice Lacroix</A><BR><A href="http://www.patekphilippewatches.us/Rolex/GMT/">Rolex GMT watches</A><BR><A href="http://www.patekphilippewatches.us/IWC/">IWC watch for sale</A><BR><A href="http://www.patekphilippewatches.us/DeWitt/">DeWitt replica</A><BR><A href="http://www.patekphilippewatches.us/Longines/">Longines replica</A><BR><A href="http://www.patekphilippewatches.us/Alain-Silberstein/">Alain Silberstein watch for sale</A><BR>

Name: Rado replica 2010-01-11 15:36

<A href="http://www.iwcwatches.us/Franck-Muller/">replica Franck Muller</A><BR><A href="http://www.iwcwatches.us/">cheap replica watches</A><BR><A href="http://www.iwcwatches.us">cheap fake watches</A><BR><A href="http://www.iwcwatches.us/Patek-Philippe/">replica Patek Philippe</A><BR><A href="http://www.iwcwatches.us/Oris/">oris replica</A><BR><A href="http://www.iwcwatches.us/Breitling/">replica Breitling</A><BR><A href="http://www.iwcwatches.us/Graham/">replica Graham</A><BR><A href="http://www.iwcwatches.us/Rado/">Rado watches</A><BR><A href="http://www.iwcwatches.us/Rolex/Explorer/">Rolex Explorer replica</A><BR><A href="http://www.iwcwatches.us/Rolex/Datejust%20II/">Rolex Datejust II replica</A><BR><A href="http://www.iwcwatches.us/Omega/">omega replica</A><BR><A href="http://www.iwcwatches.us/Franck-Muller/">Franck Muller replica</A><BR>

Don't change these.
Name: Email:
Entire Thread Thread List