What is the cih, Computer Engineering

CIH, also known  as Chernobyl or Spacefiller, is a Microsoft Windows computer virus which first emerged in 1998. It is one of the most damaging viruses, overwriting critical information on infected system drives, and more extensively, in some cases corrupting the system BIOS. The virus was produced by Chen Ing-hau who was a student at Tatung University in Taiwan. 60 million computers were believed to be infected by the virus internationally, resulting in an estimated $1 billion US dollars in commercial damages.    

 

 

Posted Date: 4/6/2013 1:04:36 AM | Location : United States







Related Discussions:- What is the cih, Assignment Help, Ask Question on What is the cih, Get Answer, Expert's Help, What is the cih Discussions

Write discussion on What is the cih
Your posts are moderated
Related Questions
Reprography In order to disseminate information widely some method of reprography is invariably used. Reprography is the science and practice of copying documents by photograph

How many bits must be decoded for chip select? What is the size of decoder when 128 × 8 RAM chips are required to provide a memory capacity of 2048 bytes? Ans. All higher order l

In Java System.out is an object of type? In Java System.out is an object of form Print Stream.

How does dynamic memory allocation help in managing data

Bitwise Left Shift and Right Shift Operators: > shift-expression : additive-expression shift-expression > additive-expression The bitwise shift operators shift their

Explain the term- Scan Insertion Scan Insertion is completed by a tool and results in all (or most) of your design's flip-flops to be changed by special "Scan Flip-flops". Sca

Explain essential loop in Process Scheduling . The complex part of scheduling is to balance policy enforcement along with resource optimization so as to pick the best job to run

Synchronized with a clock signal Memory system considerations Speed Cost Size of chip Power dissipation Memory controller Refresh Overhead

what is time out based schemes in concurrency control

Assemblies are made up of IL code modules and the metadata that explains them. Although programs may be compiled by an IDE or the command line, in fact, they are easily translated