_____is a computer program that is loaded into a computer without the owner's
knowledge:
a) Hack Material
b) Viruses
c) Both of Above
d) None of These

1 Answer

Answer :

b) Viruses

Related questions

Description : _____is the product of data processing: a) Data b) Information c) A Computer d) None of The Above

Last Answer : b) Information

Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these

Last Answer : Answer :4

Description : _____is the science that attempts to produce machines that display the same type of intelligence that humans do. 1) Nano science 2) Nanotechnology 3) Simulation 4) Artificial intelligence (AI) 5) None of these

Last Answer : Answer :4

Description : _____is an abbreviation for binary digit: a) bingit b) base c) bit d) None of The Above

Last Answer : c) bit

Description : A _____is defined as "some sort of hardware architecture or software framework (including application frameworks), that allows software to run: a) Antalogy b) Platforms c) Toylogy d) None of These

Last Answer : b) Platforms

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These

Last Answer : b) Bugs

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? A) Memory address registers B) Memory data registers C) Instruction register D) Program counter

Last Answer : Answer : C

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : _____is referred as both fund based and fee based financial service.(a) Higher purchase b) underwriting c) Factoring)

Last Answer : b) underwriting

Description : ______ is the first layer of software loaded into computer memory when it starts up. A. Device Drivers B. Language translators C. System Utilities D. Operating system

Last Answer : D. Operating system

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : _____is not an allotrope of carbon. (1) Buckminsterfullerene (2) Carbon Doxide (3) Diamond (4) Graphite

Last Answer : (2) Carbon Doxide Explanation: Carbon is capable of forming many allotropes due to its valency. Well-known forms of carbon include diamond and graphite. Other allotropes in clude: include buckyballs (fullerenes), amorphous carbon, glassy carbon, carbon nanofoam, nanotubes,and others.

Description : _____is the nematode that causes the blackhead disease in banana crop? A. Pratylenchus coffee B. Heterodera oryzicola C. Radopholus similis D. Helicotylenchus multicinctus

Last Answer : C. Radopholus similis

Description : _____is used to detect wireless networks on the windows platform a) Medusa b) NetStumbler c) SQLMap d) Iraon WASP

Last Answer : b) NetStumbler

Last Answer : Hygroscopicity is the property of absorbing moisture from atmosphere.

Description : _____is viscoelastic.

Last Answer : Rubber is viscoelastic.

Description : _____is an open loop control system.

Last Answer : Field controlled D.C. motor is an open loop control system.

Description : _____is a closed loop system.

Last Answer : Auto-pilot for an aircraft is a closed loop system.

Description : Before checking the program for errors in translating code into machine language the high level language code is loaded into __ a. Register b. Memory c. Data d. CPU

Last Answer : b. Memory

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : D. Physical access

Description : what type of ethical hack test access to the physical infra structure (a) internal network (b) remote network (c) external network (d) physical network

Last Answer : (d) physical network

Description : What type of ethical hack tests access to the physical infrastructure? A. Internal network B. Remote network C. External network D. Physical access

Last Answer : Answer. Option D.

Description : What type of ethical hack tests access to the physical infrastructure? ∙ A. Internal network ∙ B. Remote network ∙ C. External network ∙ D. Physical access

Last Answer : D. Physical access

Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter

Last Answer : Instruction register

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address register b. Memory data register c. Instruction registers d. Program counter

Last Answer : c. Instruction registers

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address registers b. Memory data registers c. Instruction register d. Program counter

Last Answer : c. Instruction register

Description : Which of the following registers is loaded with the contents of the memory location pointed by the PC? a. Memory address register b. Memory data register c. Instruction registers d. Program counter

Last Answer : c. Instruction registers

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : Is there any way I can load backup copies of wii games on my wii without a hack or mod?

Last Answer : Not with firmware 3.4. You could look into downgrading, but that’s kinda risky. This article is worth a look.

Description : Does the new iPod nano have Internet capabilatyies without having to hack it?

Last Answer : answer:No, it doesn’t have a network card, so you can’t. Maybe there will come cards which connect via the iPod dockconnector, but don’t count on it. By the way: your battery will drain sooner because of power consumption.

Description : What is the method to hack Wifi with Android phone ? without root .

Last Answer : WiFi cannot be hacked. Although rooted can be set. Unroot cannot be set.

Description : How to hack wifi password on android phone without root?

Last Answer : Well, hacking is not very nice, as it is a crime in fact. Instead of having all the hassle to do that you can look for apps that allow you to connect to public and private wi-fi networks. In fact it kind ... To name a few you can try Wi-fi Map, Vazoo, Mandic Magic. There are many more, I am sure.

Description : A steel bar 5 m × 50 mm is loaded with 250,000 N. If the modulus of elasticity of the material is 0.2  MN/mm2  and Poisson's ratio is 0.25, the change in the volume of the bar is:  (A) 1.125 cm3 (B) 2.125 cm3 (C) 3.125 cm3 (D) 4.125 cm

Last Answer : (C) 3.125 cm

Description : computer system without the owner’s informed consent. (a) Blog -Technology

Last Answer : (d) Malware designed to interrupt ongoing computer operations, collect private information and gain unauthorized access to your system resources.

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1) Phishing trips 2) Computer viruses 3) Spyware scams 4) Phishing Scams

Last Answer : 4) Phishing Scams

Description : .....are attempts by individuals to obtain confidential information from you by falsifying their identity. 1 Phishing trips 2 Computer viruses 3 Spyware scams 4 Phishing Scams

Last Answer : 4 Phishing Scams

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses