Question

In: Computer Science

Q2: What are the forms of malware? Differentiate briefly between them. Give example for each.? Q4:...

Q2: What are the forms of malware? Differentiate briefly between them. Give example for each.?

Q4: what are the similarities and differences of the two types of protocols TCP and UDP?

Solutions

Expert Solution

Answer)

Answer 2) Some of the malware forms are as follows:

Worms which lead to spreading in the software as vulnerability and phishing attack

Adware is also a way of malware which automatically delivers the advertisement where most of the free version of the advertisement is bundled with the software.

The bug is a flaw in the system which gives an undesirable result or outcome. It occurs because of human error and marks its existence because of source code or the compilers of the program

Ransomware is another kind of malware which holds the computer system while demanding the ransom where the user access is restricted

The rootkit is considered as the type of malicious software which was designed for remotely accessing the computer system without even being detected by any user or any of the security programs. Once this gets installed then there is no modification that can be done.

Spyware is where the type of malware where the function which would spy on the other functions or the user activity without notifying them.

Some of the other examples are Virus, Trojan horse, worms etc

Answer 4)

Difference:

TCP is reliable yet a little slow and most are used for the email and web browsing and are unicast by nature. This is a connection-oriented protocol and is meant for highly reliable and transmission timeless and critical activity. The header size is 20 bytes. It also rearranges the data packet in the order specified.

The UDP is not reliable but can be used for broadcast, unicast and multicast and is associated with the type of application like the VOIP and music streaming. The header size for UDP is 8 bytes. Used for efficient transmission, and for faster application. This is not connection-oriented. This is meant for message transfer and transport.

Similarity:

Both of these are the protocol meant for message transfer and transport.

Both of them have access to unicast transmission.

Hope this answer helps.
If you find this answer useful, do hit like.
Thanks


Related Solutions

give an briefly explain 3 forms of inheritance, give an example of each?
give an briefly explain 3 forms of inheritance, give an example of each?
Differentiate between a foundation species and a keystone species. Give an example of each. What is...
Differentiate between a foundation species and a keystone species. Give an example of each. What is an invasive species? Give an example. What is a pioneer species, and under what circumstances are these species important?
7. What are the different forms of Inheritance? Give an example for each.
7. What are the different forms of Inheritance? Give an example for each.
Briefly explain the three forms of market efficiency. For each type, give one example and explain...
Briefly explain the three forms of market efficiency. For each type, give one example and explain whether market is efficient in your example.
Differentiate between correlation and causality. Give an example to illustrate the difference.
Differentiate between correlation and causality. Give an example to illustrate the difference.
Differentiate between corporate social responsibility and corporate social responsiveness. Give an example of each. How does...
Differentiate between corporate social responsibility and corporate social responsiveness. Give an example of each. How does corporate social performance relate to these terms? Where do corporate citizenship and sustainability fit in?
(a) differentiate between parametric and non parametric statistics and give one example for each test. (b)outline...
(a) differentiate between parametric and non parametric statistics and give one example for each test. (b)outline and discuss the steps which guide a researcher in designing a questionnaire. (c) briefly discuss the merit and demerit of a questionnaire as a research tool.
Differentiate between intrapersonal communication and interpersonal communication. Give your own example of each criteria for both...
Differentiate between intrapersonal communication and interpersonal communication. Give your own example of each criteria for both scope of communication. What makes group communication and organizational communication different? Discuss with relevant examples.
Define intellectual property. What are the four forms of intellectual property? Give an example of each.
Define intellectual property. What are the four forms of intellectual property? Give an example of each.
Differentiate between private goods, pure public goods and impure public goods. Give one example of each....
Differentiate between private goods, pure public goods and impure public goods. Give one example of each. (approx 250 words)
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT