menu
Qammunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating systems to distribute itself to more than 6,000 of the …
Ask a Question
Questions
Unanswered
Tags
Ask a Question
In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating systems to distribute itself to more than 6,000 of the …
asked
Aug 7, 2020
96.8k
views
1
vote
In 1988, Robert Morris, Jr. launched a program called the _________ that used weaknesses in e-mail programs and operating systems to distribute itself to more than 6,000 of the 60,000 computers that were then connected to the Internet.
Computers & Tech
high-school
Adam Tanner
asked
by
Adam Tanner
7.4k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
2
votes
The program was called the Morris Worm.
Tanaya
answered
Aug 13, 2020
by
Tanaya
8.1k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Jan 12, 2024
17.4k
views
In 1988, who was responsible for the first malicious internet-based attack? a) Mark Zuckerberg b) Tim Berners-Lee c) Robert Tappan Morris d) Steve Jobs
Arindam Mukherjee
asked
Jan 12, 2024
by
Arindam Mukherjee
8.3k
points
Computers & Tech
high-school
1
answer
0
votes
17.4k
views
asked
Dec 9, 2024
100k
views
Describe the general hypothesis, methods, and key results of the study done by Morris et al. (1953) and provide strengths & weaknesses.
Qiubit
asked
Dec 9, 2024
by
Qiubit
8.4k
points
History
high-school
1
answer
3
votes
100k
views
asked
Dec 24, 2024
114k
views
The Internet worm was released by a) John Barlow. b) Katie Hafner. c) John Markoff. d) Robert Morris, Jr.. e) Bruce Sterling.
Vishesh Mishra
asked
Dec 24, 2024
by
Vishesh Mishra
8.0k
points
Computers & Tech
high-school
1
answer
3
votes
114k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qammunity.org