CA virus - définition. Qu'est-ce que CA virus
Diclib.com
Dictionnaire ChatGPT
Entrez un mot ou une phrase dans n'importe quelle langue 👆
Langue:

Traduction et analyse de mots par intelligence artificielle ChatGPT

Sur cette page, vous pouvez obtenir une analyse détaillée d'un mot ou d'une phrase, réalisée à l'aide de la meilleure technologie d'intelligence artificielle à ce jour:

  • comment le mot est utilisé
  • fréquence d'utilisation
  • il est utilisé plus souvent dans le discours oral ou écrit
  • options de traduction de mots
  • exemples d'utilisation (plusieurs phrases avec traduction)
  • étymologie

Qu'est-ce (qui) est CA virus - définition

COMPUTER WORM
ExploreZip virus; Explorezip virus; Worm.ExploreZip virus; Explorezip

CA (journal)         
PEER-REVIEWED SCIENTIFIC JOURNAL
CA Cancer J Clin; CA - A Cancer Journal for Clinicians; CA Cancer Journal Clin; CA Cancer Journal for Clinicians; CA – A Cancer Journal for Clinicians; CA Cancer J. Clin.; Ca (journal)
CA: A Cancer Journal for Clinicians is a bimonthly peer-reviewed medical journal published for the American Cancer Society by Wiley-Blackwell. The journal covers aspects of cancer research on diagnosis, therapy, and prevention.
Pipistrel Virus         
  • Pipistrel Virus cockpit
  • Pipistrel Virus SW
1999 LIGHT AIRCRAFT
Pipistrel Virus SW
The Pipistrel Virus is a two-seat, single engine light aircraft, manufactured by Pipistrel in Slovenia and Italy, and sold as an ultralight, homebuilt kit, or light-sport aircraft.Vandermeullen, Richard: 2012 Kit Aircraft Buyer's Guide, Kitplanes, Volume 28, Number 12, December 2011, page 63.
Caproni Ca.101         
  • Caproni Ca.102
  • Caproni Ca.102
AIRLINER
Caproni Ca.102; Caproni Ca 101; Ca.101
The Caproni Ca.101 was a three-engine Italian airliner which later saw military use as a transport and bomber.

Wikipédia

ExploreZip

ExploreZip (also known as I-Worm.ZippedFiles) is a destructive computer worm that attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999. The worm contains a malicious payload, and utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in the user's inbox. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the Windows folder of the remote computer and then modifies the Win.ini file of the infected computer. On January 8, 2003, Symantec discovered a packed variant of this threat which exhibits the same characteristics.