CA virus - перевод на арабский
Diclib.com
Словарь ChatGPT
Введите слово или словосочетание на любом языке 👆
Язык:

Перевод и анализ слов искусственным интеллектом ChatGPT

На этой странице Вы можете получить подробный анализ слова или словосочетания, произведенный с помощью лучшей на сегодняшний день технологии искусственного интеллекта:

  • как употребляется слово
  • частота употребления
  • используется оно чаще в устной или письменной речи
  • варианты перевода слова
  • примеры употребления (несколько фраз с переводом)
  • этимология

CA virus - перевод на арабский

COMPUTER WORM
ExploreZip virus; Explorezip virus; Worm.ExploreZip virus; Explorezip

CA virus      
‎ الفَيرُوسُ نَظيرُ الانفلونزا‎
Ca         
WIKIMEDIA DISAMBIGUATION PAGE
Ca; Ca.; CA (disambiguation); C.A.; C.a.; C A; C-A; Ca (disambiguation); Ca. (disambiguation); C.A
رمز الكالْسُيوم (كا; Ca)
ca.         
WIKIMEDIA DISAMBIGUATION PAGE
Ca; Ca.; CA (disambiguation); C.A.; C.a.; C A; C-A; Ca (disambiguation); Ca. (disambiguation); C.A
مختصر تَقْرِيْبَاً

Определение

Computer Associates International, Inc.
<company> (CA) A US software development company, founded in 1976. CA have purchased many other software companies, including Spectrum Software, Inc., Cheyenne Software, Platinum Technology, Inc., ASK Corporation. They produce a number of popular software packages, including {Unicenter TNG} and Ingres. They had an Initial Public Offering in 1981 valued at more than US$3.2M, had more than US$6B in revenue in 2000, and employ more than 17,000 people. http://ca.com/. (20002-04-20)

Википедия

ExploreZip

ExploreZip (also known as I-Worm.ZippedFiles) is a destructive computer worm that attacks machines running Microsoft Windows. It was first discovered in Israel on June 6, 1999. The worm contains a malicious payload, and utilizes Microsoft Outlook, Outlook Express, or Exchange to mail itself out by replying to unread messages in the user's inbox. The worm also searches mapped drives and networked computers for Windows installations. If found, it copies itself to the Windows folder of the remote computer and then modifies the Win.ini file of the infected computer. On January 8, 2003, Symantec discovered a packed variant of this threat which exhibits the same characteristics.