A …………………….. creates copies during replication that are functionally equivalent but have  distinctly different bit patterns.
A) Boot Sector Virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

1 Answer

Answer :

B) Polymorphic Virus

Related questions

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus. A) mutual engine B) mutation engine C) multiple engine D) polymorphic engine

Last Answer : C) multiple engine

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : A .................. normal form normalization will be needed where all attributes in a relation tuple are not functionally dependent only on the key attribute. A) First B) Second C) Third D) Fourth

Last Answer : C) Third

Description : What is Boot Sector Virus ?

Last Answer : : The first sector of the floppy disk is the boot sector. The boot sector of the hard disk is the first sector of the partition. It contains information about disks or partitions ; For example, the ... , it can easily infect the computer if there is a disk on the drive when the computer starts.

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.

Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

Description : ______was the first technique that posed a serious threat to virus scanners: a) Vulnerability Code b) Polymorphic Code c) Antimorphic Code d) None of These

Last Answer : b) Polymorphic Code

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : Nondisjunction of a chromosome results in which of the following diagnoses? a) Down Syndrome When a pair of chromosomes fails to separate completely and creates a sperm or oocyte that contains two ... genetic condition that may occur in a single family member as a result of spontaneous mutation.

Last Answer : a) Down Syndrome When a pair of chromosomes fails to separate completely and creates a sperm or oocyte that contains two copies of a particular chromosome (nondisjunction) Down syndrome results from three number 21 chromosomes.

Description : A ……………… allows to make copies of the database periodically to help in the cases of crashes & disasters. A) Recovery utility B) Backup Utility C) Monitoring utility

Last Answer : B) Backup Utility

Description : $ Homologous organs are those which are functionally similar but different by origin. ! Homothallic plants are those which are unisexual.

Last Answer : $ Homologous organs are those which are functionally similar but different by origin. ! Homothallic plants are ... D. If both As and R are wrong.

Description : The type(s) of auto executing macros, in Microsoft word is/are A) Auto execute B) Auto macro C) Command macro D) All of the above

Last Answer : D) All of the above

Description : A .................... architecture assigns only a few essential functions to the kernel, including address spaces, Inter process communication(IPC) and basic scheduling. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : B) Micro kernel

Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : A) Monolithic kernel

Description : ............... is a large operating system core provides a wide range of services. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : D) Macro kernel

Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : B) Monolithic kernel

Description : The translator which performs macro calls expansion is called : (A) Macro processor (B) Micro pre-processor (C) Macro pre-processor (D) Dynamic linker

Last Answer : (C) Macro pre-processor 

Description : The “PROJECT” operator of a relational algebra creates a new table that has always (A) More columns than columns in original table (B) More rows than original table (C) Same number of rows as the original table (D) Same number of columns as the original table

Last Answer : (C) Same number of rows as the original table

Description : In UNIX operating system, when a process creates a new process using the fork() system call, which of the following state is shared between the parent process and child process? (A) Heap (B) Stack (C) Shared memory segments (D) Both Heap and Stack

Last Answer : (C) Shared memory segments 

Description : In UNIX, ............ creates three subdirectories: 'PIS' and two subdirectories 'progs' and ‘data’ from just created subdirectory 'PIS'. (A) mdkir PIS/progs PIS/data PIS (B) mkdir PIS progs data (C) mkdir PIS PIS/progs PIS/data (D) mkdir PIS/progs data

Last Answer : (C) mkdir PIS PIS/progs PIS/data

Description : Which of the following statement(s) is/are correct? (1) Persistence is the term used to describe the duration of phosphorescence. (2) The control electrode is used to turn the electron beam on and off. (3) ... which are focussed into a narrow beam directed at the face of CRT. (4) All of the above. 

Last Answer : All of the above.

Description : The ..................... is essentially used to search for patterns in target string. A) Like Predicate B) Null Predicate C) In Predicate D) Out Predicate

Last Answer : A) Like Predicate

Description : ................. maintains the list of free disk blocks in the Unix file system. (A) I-node (B) Boot block (C) Super block (D) File allocation table

Last Answer : (C) Super block 

Description : Why is the Christopher Lane shooting getting a distinctly different style of media coverage than, say the Trayvon Martin shooting?

Last Answer : It seems to me that the whole controversy of Trayvon Martin was that it could be potentially used to defend any white man who shot a black man who was merely approaching him because of stand ... school shooting sort of thing where some budding sociopaths just found a random guy to kill for sport.

Description : Which of the following best describes relationships among auditing, attest and assurance services? a. Attest is a type of auditing service. b. Assurance is a type of attest service. c. ... type of assurance service. d. Auditing and attest services represent two distinctly different types of services

Last Answer : Auditing is a type of assurance service

Description : Which of the following best describes relationships among auditing, attest and assurance services? a. Attest is a type of auditing service. b. Assurance is a type of attest service. c. ... type of assurance service. d. Auditing and attest services represent two distinctly different types of services

Last Answer : Auditing is a type of assurance service

Description : Elements that exist in two or more distinctly different solid forms are known as: w) azeotropes x) allotropes y) isotopes z) isochores

Last Answer :  ANSWER: X -- ALLOTROPES 

Description : Which one of the following features is absent in a virus? (1) reproduce within host cell (2) presence of cell wall (3) fully parasitic in nature (4) presence of either DNA or

Last Answer : (2) presence of cell wall Explanation: A virus has a simple structure. It has no internal cellular structure, no cell wall or cell membrane, just the protein coat that holds the string of nucleic ... is a layer located outside the cell membrane found in plants, fungi, bacteria, algae, and archaea.

Description : Which one of the following features is absent in a virus ? (1) reproduce within host cell (2) presence of cell wall (3) fully parasitic in nature (4) presence of either DNA or RNA

Last Answer : presence of cell wall 

Description : A person who can see distant objects clearly but cannot see nearby objects distinctly is suffering from which eye disease?

Last Answer : Hypermetropia.

Description : Every computer will find the boot after any power outage and it will come in normally, but there is a group that imaged (hp'compaq desktop pc) You will need to reset the BIOS after everything super. How can you find a solution to this problem?

Last Answer : If you replaced the motherboard and still do, it's unfortunately due to a motherboard failure. It may need to be repaired if it’s worth it, but at the motherboard level, they can’t reach into the machine everywhere. You can find people especially in Pest. 

Description : Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase A) i, ii, iii, and iv B) i, iii, ii and iv s D) ii, iii, iv and i

Last Answer : C) ii, i, iv an iii

Description : The operation executed on data stored in registers is called_______ A. Macro-operation B. Micro-operation C. Bit-operation D. None of the Above

Last Answer : B. Micro-operation

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Best Evidence Rule states that a. It states that multiple copies of electronic files may be a part of the original or equivalent to the original. b. It states that copy of evidence may be ... that multiple copies of electronic files may be a part of the original or same as original.

Last Answer : It states that multiple copies of electronic files may be a part of the “original” or equivalent to the “original.”

Description : What is a macro virus ?

Last Answer : This type of virus is often seen nowadays. Macro viruses are the first viruses to infect data files. Macro viruses are made up of macro or OLE objects and are very easy to write off from ... floppy disk or internal network of infected documents , e-mail attachments or file downloads on the Internet.

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : _____ infections have cost more money and taken more time to repair than any other virus type: a) File Infector Viruses b) Multi Partite Viruses c) Macro Viruses d) None of These

Last Answer : c) Macro Viruses

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : Who isn't annoyed when something familiar and functionally understandable gets changed all around?

Last Answer : answer:If you have to search for the stuff you need, you have to trawl past the stuff you don’t really need and most probably buy it. I hate them for it!......

Description : What is the proportion of sites that are polymorphic?

Last Answer : Feel Free to Answer

Description : What mathematical plane figure is ideal in cellular system design and engineering it graphically and functionally depicts overlapping radio coverage between and among adjacent cell base stations? A. Hexagon B. Octagon C. Pentagon D. Nonagon

Last Answer : A. Hexagon

Description : What is the consequence between a node and its predecessors while creating bayesian network? a) Functionally dependent b) Dependant c) Conditionally independent d) Both Conditionally dependant & Dependant

Last Answer : c) Conditionally independent

Description : Genes that are involved in turning on or off the transcription of a set of structural genes are called (a) redundant genes (b) regulatory genes (c) polymorphic genes (d) operator genes.

Last Answer : (d) operator genes.

Description : Genes that are involved in turning on or off the transcription of a set of structural genes are called (a) redundant genes (b) regulatory genes (c) polymorphic genes (d) operator genes.

Last Answer : (d) operator genes.

Description : Which is true about Trypanosoma? (a) Polymorphic (b) Monogenetic (c) Facultative parasite (d) Non-pathogenic

Last Answer : (a) Polymorphic