Mailing-List: contact cygwin-help AT sourceware DOT cygnus DOT com; run by ezmlm List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT sourceware DOT cygnus DOT com Delivered-To: mailing list cygwin AT sourceware DOT cygnus DOT com From: Chris Faylor Date: Wed, 8 Mar 2000 10:58:15 -0500 To: cygwin AT sourceware DOT cygnus DOT com Subject: Re: question! (off-topic) Message-ID: <20000308105815.A9193@cygnus.com> Reply-To: cygwin AT sourceware DOT cygnus DOT com Mail-Followup-To: cgf AT cygnus DOT com, cygwin AT sourceware DOT cygnus DOT com References: <8867920 DOT 952513031716 DOT JavaMail DOT imail AT sammy> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.1.8i In-Reply-To: <8867920.952513031716.JavaMail.imail@sammy>; from michelle_owen@excite.com on Wed, Mar 08, 2000 at 02:57:11AM -0800 These questions are inappropriate for this mailing list. I would appreciate it if anyone feels the need to respond that they do so privately. Or is this just spam? On Wed, Mar 08, 2000 at 02:57:11AM -0800, Michelle Owen wrote: >Dear, > > > Would you kind to answer my few questions in details? Here they are: > > 1. Virtual memory managment increases the amount of memory the >operating system > can use by allocating a set amount of disk space to be used to >store item > during processing. With the aid of windows 95/98, can you give me >the steps to check > for the virtual memory of a computer system? > > 2. Every programming languange has its own unique characteristic, >thus selecting a language > for a programming task can be a difficult decision. Can you give >me the list and describe > four factors to select a programming language? > > 3. Computer security risk is any event or action that could cause a >loss to computer equipment, > software information or processing capability. Please describe >briefly to me the following > security risks: > a). Computer viruses > b). Unauthorized access and use > c). Hardware theft > d). Software theft > e). System failure > > 4. a). How do viruses spread? When does a virus spread? Why are >viruses not detected immediately? > b). Would you name and describes 6 types of computer viruses? and >please describe how this viruses > spread in the computer system? > > > Thanks for your help...:) > > > > > >_______________________________________________________ >Get 100% FREE Internet Access powered by Excite >Visit http://freeworld.excite.com > > >-- >Want to unsubscribe from this list? >Send a message to cygwin-unsubscribe AT sourceware DOT cygnus DOT com > -- cgf AT cygnus DOT com Cygnus Solutions, a Red Hat company http://sourcware.cygnus.com/ http://www.redhat.com/ -- Want to unsubscribe from this list? Send a message to cygwin-unsubscribe AT sourceware DOT cygnus DOT com