Expert Virus Welcome! You are encouraged to register with the site and login (for free). When you register, you support the site and your question history is saved.Which of the following most logically completes the argument?A particular computer virus frequently infects personal computers through an email message. Even though virus-scanning software installed on a computer is designed to identify and alarm the user of a virus infection on that computer shortly after it occurs, this particular virus is rarely observed by virus-scanning software. This fact, however, does not mean that the computer's security systems have blocked installation of the virus, because _______________. shortly after it appeared on the Internet, hackers modified the virus in a way that made it more effective the virus was able to replicate itself and then send itself to people in the victim's address book even after the virus had stopped spreading, the backdoors created during the initial infections remained active the virus was able to disable virus-scanning software and pose as a virus-removal tool the virus also altered the victim's operating system in a way that made it difficult to shut down the computer without cutting off power to the system Review Answer