An error in computer program is called:
a) Hacking
b) Virus
c) Bug
d) None of These

1 Answer

Answer :

c) Bug

Related questions

Description : An error in a computer program is known as _______: a) Crash b) Power Failure c) Bug d) Virus e) Fatal Error

Last Answer : c) Bug

Description : An error in a computer program a) Crash b) Power Failure c) Bug d) Virus e) None of these

Last Answer : c) Bug

Description : An error in a computer program is: a) Crash b) Bug c) Power Failure d) None of These

Last Answer : b) Bug

Description : Bug describes: a) An error in computer program b) Some problems in wires in computer system c) Only internet connectivity problem d) None of These

Last Answer : a) An error in computer program

Description : An error in a computer program is: a) Crash b) Bug c) Power Failure d) None of These

Last Answer : b) Bug

Description : An error in computer data is called A) Chip B) Bug C) CPU D) Storage device

Last Answer : Answer : B

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? A) Leech B) Squid C) Slug D) Glitch

Last Answer : Answer : D

Description : What is the best anti-virus/anti-spyware/anti-hacking program (free or not free) out there?

Last Answer : They are all very very similar, all of the big guys (Trend, Symantec, Macafee) collaborate on their virus definitions to lower development costs and to speed up the reaction time to outbreaks. The main ... computer I would simply find one that was on special and get it on the cheap. Cheers! Mike

Description : What is the best anti-virus/anti-spyware/anti-hacking & firewall program (free or not free) out there for APPLE MAC?

Last Answer : OSX. There are still 0 confirmed viruses for Macs running OSX. There are a couple Trojans, apparently, but you’d have to go looking for them to find them – and be pretty stupid to actually get infected by them. So, I wouldn’t consider it a problem worth worrying about on a Mac. Enjoy!

Description : A ‘bug’ in a programme is a (1) Statement (2) Error (3) Signature (4) both (2) and (3)

Last Answer : Error

Description : An error in computer data is called a. Chip b. Bug c. CPU d. Storage device

Last Answer : Bug

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : Glitch

Description : An error in computer data is called a. Chip b. Bug c. CPU d. Storage device

Last Answer : b. Bug

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : d. Glitch

Description : An error in computer data is called a. Chip b. Bug c. CPU d. Storage device

Last Answer : b. Bug

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : d. Glitch

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : Which term refers for modifying a computer in a way which was not originally intended to view Information? A. Metadata B. Live analysis C. Hacking D. Bit Copy

Last Answer : C. Hacking

Description : Which is not an Ethical Hacking related career a. Back-End Developer b. Software Tester c. Software Developer d. Computer Networking Specialist

Last Answer : b. Software Tester

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : a. Identifying weakness in computer system or networks

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : What is hacking ? a. Identifying weakness in computer system or networks b. Refers to act of locating vulnerabilities c. A security to your personal data d. Protocols of corrupting data

Last Answer : d. Protocols of corrupting data

Description : Investigation means : a. Collection of information b. A procedure to find the Digital Evidence c. Searching over internet d. Hacking computer systems

Last Answer : b. A procedure to find the Digital Evidence

Description : Identifying weakness in computer system or network to exploit its weaknesses to gain access is known as a. Cracking b. Cybersecurity c. Hacking d. Threatening

Last Answer : c. Hacking

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : The problem that threatens the success of a project but which has not yet happened is a (A) bug (B) error (C) risk (D) failure

Last Answer : (C) risk

Description : Define Bug, Error, Fault, and Failure.

Last Answer :  Bug: A bug can be defined as the initiation of error or a problem due to which fault, failure, incident or an anomaly occurs. Error: A human action that produces an incorrect result. ... prescribed in the system specification. A software fault becomes a software failure only when it is activated.

Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus

Last Answer : d) Virus

Description : A/an ______ is a system susceptibility or flaw: a) Error b) Vulnerability c) Virus d) None of These

Last Answer : b) Vulnerability

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : d) Whistle Blowers

Description : 5. Hacking for a cause is called __________________ A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking

Last Answer : B. Hacktivism

Description : 4. Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking

Last Answer : B. Hacktivism

Description : Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking

Last Answer : B. Hacktivism

Description : . . Hacking for a cause is called ..................  Hacktivism  Black-hat hacking  Active hacking  Activism

Last Answer :  Hacktivism

Description : Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________. a. Cracking b. Analysis c. Hacktivism d. Exploitation

Last Answer : d. Exploitation

Description : Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking. a. Local networking b. Social engineering c. Physical entry d. Remote networking

Last Answer : d. Remote networking

Description : hackings for a causes is called (a) active hacking (b) hacktivism (c) activism (d) black-hat-hackers

Last Answer : (b) hacktivism

Description : Hacking for a cause is called __________________. A. Active hacking B. Hacktivism C. Activism D. Black-hat hacking

Last Answer : B. Hacktivism

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : c) Script Kiddies

Description : Hacking for a cause is called __________________. ∙ A. Active hacking ∙ B. Hacktivism ∙ C. Activism ∙ D. Black-hat hacking

Last Answer : B. Hacktivism

Description : Punishment for Hacking in Inida is: a) Imprisonment up to 3 years only b) Fine (Depend on case to case) only c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Punishment for Hacking in Inida is: a) Imprisonment up to 3 years only b) Fine (Depend on case to case) only c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Which is the legal form of hacking based on which jobs are provided in IT industries and firms? a) Cracking b) Non ethical Hacking c) Ethical hacking d) Hactivism

Last Answer : c) Ethical hacking

Description : What is the first phase of hacking? A. Attack B. Maintaining access C. Gaining access D. Reconnaissance E. Scanning

Last Answer : D. Reconnaissance

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking

Description : . After performing ____________ the ethical hacker should never disclose client information to other parties. a) hacking b) cracking c) penetration testing d) exploiting

Last Answer : c) penetration testing