Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors
Last Answer : B) Virus
Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm
Last Answer : D) Worm
Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse
Last Answer : B) Zombie
Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm
Last Answer : d)Worm
Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm
Last Answer : iv) Worm
Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie
Last Answer : A) Trojan Horse
Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. A) Trap doors B) Trojan horse C) Logic Bomb D) Virus
Last Answer : A) Trap doors
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. A) Trap doors B) Trojan horse C) Logic Bomb
Last Answer : C) Logic Bomb
Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors
Last Answer : b)Virus
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : c) Logic Bomb
Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. A) Zombie B) Worm C) Trojan Horses D) Logic Bomb
Last Answer : C) Trojan Horses
Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie
Last Answer : a)Trojan Horse
Description : The ……….. is code that recognizes some special sequence of input or is triggered by being run from a certain user ID of by unlikely sequence of events. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : a) Trap doors
Description : Match the following mechanisms for interrupting the execution of a process and their uses. i) Interrupt a) Call to an operating system function ii) Trap b) Reaction to an asynchronous external event iii) Supervisor Call c) Handling of a error ... -a, iii-b C) i-b, ii-c, iii-a D) i-a, ii-c, iii-b
Last Answer : C) i-b, ii-c, iii-a
Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. A) True, False B) False, True C) True, True D) False, False
Last Answer : C) True, True
Description : A small group of people are all standing around a two-foot tall, empty, wooden container. Two women approach the group carrying a silver container, which they place inside the wooden container. No ... circular motions. After this, the top of the silver container is removed, and an objec -Riddles
Last Answer : This group was making home made ice cream using an old fashioned hand-cranked ice cream freezer.
Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb
Last Answer : c) Trojan Horses
Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : d. None of the above
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : Is there a virus that attacks anti-virus program?
Last Answer : Yes, there were such viruses in the past. However, they usually wouled either prevent antivirus from starting, or getting updates, or would uninstall antivirus you have. What you described doesn’t look like a virus attacking your antivirus, though, more like some issue with AVG.
Description : In UNIX, processes that have finished execution but have not yet had their status collected are known as ................ (A) Sleeping processes (B) Stopped Processes (C) Zombie Processes (D) Orphan Processes
Last Answer : (C) Zombie Processes
Description : What is the small white borer type worm that attacks Hickory Trees?
Last Answer : Need Answer
Description : Which of the following 8085 microprocessor hardware interrupt has the lowest priority? (A) RST 6.5 (B) RST 7.5 (C) TRAP (D) INTR
Last Answer : Answer: D
Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus
Last Answer : C) Parasitic Virus
Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec
Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.
Description : Virus in a computer is a (1) Chemical that attacks silicon (2) Micro-organism that disturbs integrated circuits (3) Programme that damages the computer software (4) None of the above
Last Answer : Programme that damages the computer software
Description : A computer virus is (1) a chemical that attacks silicon. (2) a micro-organism that destroys integrated circuits. (3) data that the computer fails to handle. (4) a special kind of computer programme.
Last Answer : a special kind of computer programme.
Description : ................. uses electronic means to transfer funds directly from one account to another rather than by cheque or cash? (A) M-Banking (B) E-Banking (C) O-Banking (D) C-Banking
Last Answer : (B) E-Banking
Description : An artificial neurons receives n inputs x1, x2,...,xn with weights w1,w2,...,wn attached to the input links. The weighted sum ............... is computed to be passed on to a non-linear filter ϕ called activation function to release the output. (A) Σ wi (B) Σ xi (C) Σ wi + Σ xi (D) Σ wi . Σ xi
Last Answer : (D) Σ wi . Σ xi
Description : The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for executing an instruction. The fifty percent of the cycles use memory bus. A memory read/write employs one machine cycle. For ... (A) 500 Kbytes/sec (B) 2.2 Mbytes/sec (C) 125 Kbytes/sec (D) 250 Kbytes/sec
Last Answer : (D) 250 Kbytes/sec
Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology
Last Answer : 1. True2. True3. False4. False
Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : c. Denial‐of‐service attack
Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm
Last Answer : Spawn
Description : In Java variables, if first increment of the variable takes place and then the assignment occurs. This operation is also called ............................. . A) pre increment B) post increment C) incrementation D) pre incrementation
Last Answer : A) pre increment
Description : Which one of the following is correct? (A) Java applets cannot be written in any programming language (B) An applet is not a small program. (C) An applet can be run on its own. (D) Applets are embedded in another applications.
Last Answer : (D) Applets are embedded in another applications.
Description : The role of the M cell is to A- .trap virus in mucus and prevent entry B- induce apoptosis in virus-infected small intestinal epithelia cells C- pass bacteria or virus to underlying macrophages for ... and presentation of antigen D- they use their cilia to propel mucus out of the small intestine
Last Answer : pass bacteria or virus to underlying macrophages for processing and presentation of antigen
Description : Does the bad weather this winter make you secretly wish or seriously consider living in another part of the country?
Last Answer : answer:I usually love cold weather but this is exhausting. The streets in my neighborhood have been iced over for 2 weeks. It's hard to make plans because the weather worsens out of nowhere. I've had ... thought when I graduate in a few years arizona sounds nice even though I know I'd miss snow.
Description : There are two cliffs. They are each attached by a suspension bridge that takes 5 minutes to walk across, and is the only way to get to the other side. No one is allowed to cross the bridge unless ... the bridge, he'll wake up exactly when you reach the other side, and send you back)? -Riddles
Last Answer : You can't go as he is awake, he'll see you, but go when he doesn't see you. Then, turn back as he is waking up, pretending to go to the side you came from. Then, he'll figure you are unauthorized to set foot on the bridge, and send you to the side you want to get to.
Description : Name some forms of virus attacks. -Technology
Last Answer : Worms, Trojan horse, Computer Virus etc.
Description : Which of the following is correct regarding AIDS causative agent HIV? (a) HIV is enveloped virus containing one molecule of single-stranded RNA and one molecule of reverse transcriptase. (b) HIV ... ) HIV is unenveloped retrovirus. (d) HIV does not escape but attacks the acquired immune response
Last Answer : (d) HIV does not escape but attacks the acquired immune response.
Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks
Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.
Description : Zoologists extracted the chemical that the Japanese beetle uses to attract a mate, and use it in a trap to reduce the beetle population. They are utilizing a A) hormone. B) pesticide. C) enzyme. D) pheromone. E) excretion.
Last Answer : D) pheromone.
Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these
Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology
Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.
Description : The casual organism of Polio is - (1) A fungi (2) A virus (3) A worm (4) A bacteria
Last Answer : (2) A virus Explanation: Polio is a highly infectious disease caused by a virus. Its causative agent, poliovirus, was identified in 1908 by Karl Landsteiner. The polio virus invades the nervous system, and can cause total paralysis in a matter of hours.
Description : Polio disease is caused by - (1) Bacteria (2) Fungi (3) Virus (4) Worm
Last Answer : (3) Virus Explanation: Polio, or poliomyelitis, is a crippling and potentially deadly infectious disease. It is caused by the poliovirus.
Description : Which one of the following causes the Chikungunia disease? (1) Bacteria (2) Helminthic worm (3) Protozoan (4) Virus
Last Answer : (4) Virus Explanation: Humans and other primates are the natural hosts for the chikungunya virus. The virus is spread to humans by the bite of an infected female Aedes species mosquito.