A program designed to destroy data on your computer which can travel to "infect"
other
computers is called as:
a) Operational Risks
b) Torpedo
c) Infector
d) Virus

1 Answer

Answer :

d) Virus

Related questions

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : _____ infections have cost more money and taken more time to repair than any other virus type: a) File Infector Viruses b) Multi Partite Viruses c) Macro Viruses d) None of These

Last Answer : c) Macro Viruses

Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above

Last Answer : d. None of the above

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : Who might do something like infect Middle Eastern Govrnment computers with Flame, an industrial strength data vacuum cleaner?

Last Answer : The Great Satan and its minions, for example.

Description : Virus that infect bacteria are called (a) Bacteriophages (b) Basophils (c) Basal body (d) Basidiospores 

Last Answer : (a) Bacteriophages 

Description : Can Mosquitoes Infect People with the AIDS Virus Just By Biting Them?

Last Answer : Nope.

Description : Did the CIA, under the Nixon administration, deliberately infect Cuba with the swine flu virus?

Last Answer : too bad he didn’t

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : A virus must do what to reproduce? a) form a latent virus b) undergo transformation c) infect a cell d) conjugate 

Last Answer : ANSWER: C -- INFECT A CELL

Description : Which of the following is not an advantage of storied programs: a) Reliability b) Reduction in Operational Costs c) The Computers becoming general purpose d) None of The Above

Last Answer : b) Reduction in Operational Costs

Description : $ Electric ray fish is also called Torpedo ! Dinosaurs are also called Thunder-Lizards.

Last Answer : $ Electric ray fish is also called Torpedo ! Dinosaurs are also called Thunder-Lizards. A. If both As and ... is wrong D. If both As and R are wrong.

Description : Write a program to declare class having data member as hrs, mins, secs. Write constructor to assign values and destructor to destroy values. Accept & display data for one object.

Last Answer : #include<iostream.h> #include<conio.h> class time { private: int hrs, mins,sec; public: time(int h,int m,int s) { hrs=h; mins=m; sec=s; } ~time() { cout<< hours ... } }; void main() { time t(2,43,56); t.display(); getch(); }

Description : _________ are specially designed computer chips that reside inside o ther devices, such as your car or your electronic thermostat a) Servers b) Embedded computers c) Robotic computers d) Mainframes e) None of these

Last Answer : b) Embedded computers

Description : In view of the way he badmouths NAFTA, if Trump is elected, isn't he certain to torpedo the TPP?

Last Answer : I wouldn’t count anything as certain where he’s concerned. He is a total loose cannon.

Last Answer : Robert invented the torpedo.

Description : Torpedo is commonly

Last Answer : Torpedo is commonly A. Sucherfish B. Electric ray C. Globefish D. Sea horse

Description : A marine cartilaginous fish that can produce electric current is (a) Pristis (b) Torpedo (c) Trygon (d) Scoliodon.

Last Answer : b) Torpedo

Description : Patricia Welch, the Sinologist, identifies the Babao or Eight Treasures of Chinese cuisine as bear's paw, deer's tail, lark's tongue, torpedo roe, monkey's lip, carp's tail and beef marrow. The ... the rude implications of the term may prefer to call it a gibbosity. What is the Eighth Treasure?

Last Answer : Camel’s hump.

Description : Name the Advanced Torpedo Defence System (ATDS) developed by DRDO (a) Rustom (b) Mareech (c) Akashdeep (d) MLRS

Last Answer : (b) Mareech

Description : An objective of a performance audit is to determine whether an entity's a. Operational information is in accordance with government auditing standards b. Specific operating units are functioning ... present fairly the results of operations. d. Internal control is adequately operating as designed

Last Answer : Specific operating units are functioning economically and efficiently

Description : A typical objective of an operational audit is to determine whether an entity's a. Internal control structure is adequately operating as designed b. Operational information is in ... are functioning efficiently and effectively d. Financial statements present fairly the results of operations

Last Answer : Specific operating units are functioning efficiently and effectively

Description : Which of the following best describes the operational audit? a. It requires the constant review by internal auditors of the administrative controls as they relate to operations ofthe company. b. It ... attempts and is designed to verify the fair presentation of a company's results of operations.

Last Answer : It concentrates on seeking out aspects of operations in which waste would be reduced by the introduction of controls

Description : An audit designed to evaluate the efficiency and effectiveness of an organization or some or part thereof would not come under the title of a. Performance audit. b. Compliance audit. c. Management audit. d. Operational audit

Last Answer : Compliance audit.

Description : A computer program that contains expertise in a particular domain is called? a) intelligent planner b) automatic processor c) expert system d) operational symbolizer

Last Answer : c) expert system

Description : Electronic Discrete Variable Automatic Computer(EDVAC) was designed on __________ concept. (A) Objective Programming (B) Stored program (C) Both (A) and (B) (D) None of the Above

Last Answer : (B) Stored program

Description : How does malware infect a computer?

Last Answer : You download a program that seems legit but is infact infected. Common ones are browser toolbars and animated mouse cursors. but free games, task bar applications, etc. you need a virus blocker and ... software says not to downlaod something, DO NOT turn off the software so you can download it.

Description : Computers normally solve problem by breaking them down into a series of yes-or-no decisions represented by 1s and 0s. What is the name of the logic that allows computers to assign numerical values that fail ... 0 and 1? a) Human logic b) Fuzzy logic c) Boolean logic d) Operational logic

Last Answer : b) Fuzzy logic

Description : An error in computer program is called: a) Hacking b) Virus c) Bug d) None of These

Last Answer : c) Bug

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : The legal risks of ethical hacking include lawsuits due to __________ of personal data. a) stealing b) disclosure c) deleting d) hacking

Last Answer : b) disclosure

Description : I have a birch tree that died from borers. Do I need to remove it so it does not infect other trees

Last Answer : Need Answer

Description : An error in a computer program is known as _______: a) Crash b) Power Failure c) Bug d) Virus e) Fatal Error

Last Answer : c) Bug

Description : An error in a computer program a) Crash b) Power Failure c) Bug d) Virus e) None of these

Last Answer : c) Bug

Description : The first operational electronic digital computer is (1) ENIAC (2) EDVAC (3) EDSAC (4) UNIVAC

Last Answer : ENIAC

Description : The piece of hardware that converts your computers digital signal to an analog signal that can travel over telephone lines is called a: a) Red Wire b) Blue Cord c) Tower d) Modem e) None of These

Last Answer : d) Modem

Description : .Viruses that infect bacteria multiply and cause their lysis, are called (a) lysozymes (b) lipolytic (c) lytic (d) lysogenic

Last Answer : (c) lytic

Description : A central computer that holds collections of data and programs for many PCs, workstations and other computers is a: a) supercomputer b) minicomputer c) laptop d) server e) None of The Above

Last Answer : d) server

Description : What is an interpreter? A) An interpreter does the conversion line by line as the program is run B) An interpreter is the representation of the system being designed C) An interpreter is a general purpose language providing very efficient execution D) None of the above

Last Answer : Answer : B

Description : Which of the following types of audits would be intended to determine whether a governmental entity is following sound procurement practices? a. Program audit b. Operational audit c. Compliance audit d. Financial statement audit

Last Answer : Compliance audit

Description : Computers that are portable and convenient for users who travel are known as _____ 1) Super computers 2) Lap tops 3) Mini computers 4) File servers 5) None of these

Last Answer : Answer :2

Description : Computers that are portable and convenient for users who travel are known as: a) Super Computers

Last Answer : c) Laptops

Description : Your father has died, and his will stipulates, that you must infect yourself with HIV, in order to get the money. You agree to the terms. How much money did you inherit?

Last Answer : So, what, we just make up a number here? In that case I inherited $1 trillion USD.

Description : Is there some chronic disease, that you could deliberately infect yourself with, to help you lose weight?

Last Answer : There use to be a pill they offered by mail order a hundred and twenty years ago. . . . . . . . . . .It was a tapeworm egg, guaranteed weight loss or they would send you another one.

Description : Did someone Infect Fluther?

Last Answer : More info? How did you discover you had it? Anti-virus? As far as I can tell, I don’t have it, and I’m trying to recreate the problem (if it’s on our end).

Description : in these states where it's either criminally or civilly actionable to knowingly infect someone with an STD, how could you prove that the defendant isn't the party that contracted the disease rather than gave it?

Last Answer : It would be expensive BUT. Iirc there should be a way to test for the viral strain , so and do strains could be identified as related to the strain affecting the victim. After that it should be a game of finding the corcumstanvial evidence.