What harm did CIH virus do to computer ?

1 Answer

Answer :

CIH virus damages computer hard disk.

Related questions

Description : Does a virus harm a computer ?

Last Answer : : The following is a brief discussion of some of the harmful aspects of the virus: (1) The computer suddenly hangs while running and interrupts work. In this case, the computer has to be restarted, ... computer system. (13) Connect the pen drive to the corner of the computer. creates the ini file

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above

Last Answer : d. All the above

Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above

Last Answer : a. firewall

Description : How to prevent computer virus ?

Last Answer : Ways to prevent computer viruses: Anti-virus software and other preventive measures: Anti-virus software detects viruses in two common ways. The first and most common method is to identify a virus from a ... need to delete the hard drive completely (you need to delete the partition and format it).

Description : Who named the computer virus ?

Last Answer : Fred Cohen named the computer virus.

Last Answer : Computer virus is a kind of malicious program

Description : Want to know which countries in the world have been infected with Corona virus ?

Last Answer : Then you have an answer Browse you ( www.worldometer.com) Number of infected , which countries affected , daily updates , all given according to serial . Thanks

Description : What is a Multipershiet Virus ?

Last Answer : This type of virus (e.g. Tequila) infects multiple objects. Running an exe file infected with the Tequila virus puts itself in the master boot record ( MBR) . When the computer is booted ... exe and MBRs interchangeabley infected Anticad . How many again attack com, exe, MRBs and device drivers.

Description : What is File Virus ?

Last Answer : File virus executable program infects files. This is common but not always. com and exe extends files with extensions. When an infected program is run, the virus first controls the original program that was ... taking full control, the virus copies its code to another file or disk to make a copy.

Description : Who named the virus ?

Last Answer : Fendra Cohen named the virus.

Description : In what year was VIRUS named ?

Last Answer : VIRUS was renamed in 1980.

Description : Where is Brain Virus Made in Pakistan ?

Last Answer : Brain virus is made in Lahore, Pakistan.

Description : Brain virus is made in which country ?

Last Answer : Brain virus is made in Pakistan.

Description : In what year was the brain virus created ?

Last Answer : Brain virus was created in 1986.

Description : What is a virus ?

Last Answer : A virus is a type of malware.

Description : What is a virus ?

Last Answer : A virus is a type of software that attacks information and data and has the ability to increase its own number.

Description : In what year was the virus named ?

Last Answer : The virus was first named in 1980.

Description : How does the virus spread ?

Last Answer : A few years ago, researchers found out about the origin of all these viruses And that is , bats. February 6, 2003 A mysterious epidemic has spread to many countries in Asia The ... insects However, vaccinating these animals can prevent the spread of the virus and protect humans from infection.

Description : Can incense harm a computer?

Last Answer : Not unless it inhales. Does cigarette or cigar smoke damage it?

Description : Will Live TV Software do any harm to my computer if I install it?

Last Answer : …so lemme get this straight: you want me to install this on my computer to find out if it has any viruses?!? You first ;)

Description : Can the Zango media playing software harm my computer?

Last Answer : answer:I would not download it. A quick google seems to suggest it has a bad reputation as spyware/adware.

Description : Use or not to clean unnecessary files and compare CCleaner registries?

Last Answer : ¨I would not run the program to clean the registry.

Description : Keeping Your Computer Safe From The Harm Of Heat?

Last Answer : One of the biggest problems that can plague your computer is overheating. All too often, computers overheat if they are in the wrong settings. This happens for a number of different reasons. In ... Be on the smart side and take measures prior to something bad happening with your prized possessions.

Description : _____are computer programs developed to harm and disrupt computers: a) Malicious b) Stanford c) Stipulated d) None of These

Last Answer : a) Malicious

Description : What is the news paper seen on the computer screen called ?

Last Answer : A newspaper seen on a computer screen is called an online magazine.

Description : Why is digital signal useful in computer case ? Explain ?

Last Answer : Binary number system is used in computer design. Digital devices operate in binary mode. There may be a switch off of the digital signal or the signal may be present or absent . These are similar to the binary number system. So digital signal is useful in computer case.

Description : Each computer has a unique address - explain. ?

Last Answer : Every computer on the network has a unique address or identity in the Internet connection system. It has Protocol version 4 (IP V4) and Internet Protocol version 6 (IP V6) . For example: http://www.google.com.

Description : What is the most commonly used program for writing letters on a computer ?

Last Answer : Word processing programs are commonly used to write letters on a computer .

Description : Which is the first complete digital computer ?

Last Answer : The first complete digital computer is Mark- 1.

Description : How to install software on computer ?

Last Answer : Open the required file. Now from the file. Double click on exe file or setup file. To accept the terms , tick Accept or I agree . Now keep on giving next . If you want code, you will find a file named serial inside the file, open it. Copy and paste it. Give the setup Finish .

Description : What is the name of the first computer made by IBM company ?

Last Answer : Mainframe is the name of the first computer made by IBM company.

Description : Which is the first computer made with IC ?

Last Answer : The first computer made with IC IBM360.

Description : By what law is the improvement of computer hardware theory summarized ?

Last Answer : Improvements in computer hardware theory are summarized by Moore's First Law .

Description : What is the flashing symbol on the computer screen called ?

Last Answer : The flashing symbol on a computer screen is called a cursor.

Description : In which memory data is temporarily stored while working on computer ?

Last Answer : Data is temporarily stored in RAM (Random Access Memory) while working on the computer .

Description : What are the most commonly used instructions for a computer program ?

Last Answer : The most commonly used instructions of a computer program can be obtained from cache memory.

Description : What is the process of transferring files from Internet to computer called ?

Last Answer : The process of transferring files from Internet to computer is called downloading.

Description : What are all the mathematical and logical functions performed on a computer ?

Last Answer : All mathematical and logical functions in computer are performed by Central Processing Unit .

Description : Which electronic component was used in the first generation of computer ?

Last Answer : Electronic component vacuum tubes were used in the first generation of computers.

Description : Which computer will have artificial intelligence ?

Last Answer : 5th generation computers will have artificial intelligence.

Description : Which computer engineer won the Nobel Prize in Literature in 2003 ?

Last Answer : Computer Engineer J.M. Quetzi received the Nobel Prize in Literature in 2003 .

Description : Who is known as Human-Computer of India ?

Last Answer : Shakuntala Devi, known as the Human-Computer of India.

Description : What is computer monitoring ?

Last Answer : Another explosive ethical issue of information technology that scares everyone is computer monitoring of quality of work. This means that millions of employees use computers to monitor their productivity ... who have to work under electronic surveillance at the same time often face health problems.

Description : What is the purpose of computer networking ?

Last Answer : A computer network system is created by connecting multiple computers one after the other. A computer network system is a system where everyone on the network can share and work together with ... , software research shares and information research shares increase the accuracy and speed of the work.

Description : What is a computer security plan ?

Last Answer : A computer security plan is a plan that summarizes all the safeguards in writing to protect company information. The International Computer Security Association ( ICSA) collaborates with computer security plans.

Description : Why is binary number system used in computer design ?

Last Answer : Considering 0 as OFF and 1 as ON in digital signal , digital devices are easily understood, so binary number system is used in computers. Electronic circuit design is very simple as the binary system is in two states For all these reasons, binary methods are used in computer design.

Description : How does a computer process data ?

Last Answer : : The computer processes the data through the CPU by bringing the data received through input into memory. The internal process of data processing in a computer is quite complex. The following tasks are ... incredibly fast, we see so many cycles or steps being solved in the blink of an eye.

Description : What is Palmtop Computer or Personal Digital Assistant or PDA ?

Last Answer : Palm ( Palm) means the computer that can be worked in the palm of the hand is called a palmtop computer. It is also called Personal Digital Assistant or PDA or Handheld or Pocket Computer. This model is ... It also allows users to write. Due to its small size, it usually does not have a disk drive.

Description : Write using a hybrid computer ?

Last Answer : Use of Hybrid Computer: Various complex and difficult scientific and technical problems can be solved very easily and quickly through this computer. It is used in laboratories to determine the ... digital part. The digital part reveals the patient's condition based on the information obtained.