_______viruses infect executable program files:
a) File Infector Viruses
b) Macro Viruses
c) Multi Partite Viruses
d) None of These

1 Answer

Answer :

a) File Infector Viruses

Related questions

Description : _____ infections have cost more money and taken more time to repair than any other virus type: a) File Infector Viruses b) Multi Partite Viruses c) Macro Viruses d) None of These

Last Answer : c) Macro Viruses

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus

Last Answer : d) Virus

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : contain library program have to be indicated to the loader. a. Externally defined b. Internally defined c. Executable file d. All of these

Last Answer : a. Externally defined

Description : Most viruses that infect plant possess (a) single-stranded DNA (b) single-stranded RNA (c) double-stranded DNA and RNA (d) double - stranded RNA only

Last Answer : Ans:(b)

Description : What is true about viruses without exception? (1) They contain a core of RNA (2) They can infect bacteria (3) They cannot produce antibodies (4) They can multiply only in host cells

Last Answer : (4) They can multiply only in host cells Explanation: Viruses do not contain enzymes for energy production or protein synthesis. For a virus to multiply, it must invade a host cell and direct the host ... proteins, and copies of its nucleic acid, using the host cell's ATP to power the reactions.

Description : .Viruses that infect bacteria multiply and cause their lysis, are called (a) lysozymes (b) lipolytic (c) lytic (d) lysogenic

Last Answer : (c) lytic

Description : What is true about viruses without exception? (1) They contain a core of RNA (2) They can infect bacteria (3) They cannot produce antibodies (4) They can multiply only in host cells 

Last Answer : They can multiply only in host cells

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses

Description : A(n) _____ program is one that is ready to run and does not need to be altered in any way. a) Interpreter b) High level c) Compiler d) Executable e) None of these

Last Answer : d) Executable

Description : Compiling creates a(n)- 1) Program Specification 2) Algorithm 3) Executable Program 4) Subroutine

Last Answer : 3) Executable Program

Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above

Last Answer : d. None of the above

Description : The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: A. 000 B. 755 C. 744 D. 555 E. None of the above

Last Answer : B. 755

Description : A graph is said to be ……………… if the vertices can be split into two sets V1 and V2 such there are no edges between two vertices of V1 or two vertices of V2. A) Partite B) Bipartite C) Rooted D) Bisects

Last Answer : B) Bipartite

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses 

Description : Which of the following is the process of assembling program  components, data, and libraries, and then compiling and linking these to  create an executable system? a) System building b) Release management c) Change management d) Version management

Last Answer : a) System building

Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine

Last Answer : d. Executable, Stack and Subroutine

Description : The ............... transfers the executable image of a C++ program from hard disk to main memory. (A) Compiler (B) Linker (C) Debugger (D) Loader

Last Answer : (D) Loader

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description :  ________ is a program that places programs into memory and prepares them for execution. (1) Assembler (2) Compiler (3) Loader (4) Macro processor

Last Answer : Loader

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : _____is a computer program that is loaded into a computer without the owner's knowledge: a) Hack Material b) Viruses c) Both of Above d) None of These

Last Answer : b) Viruses

Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These

Last Answer : b) Bugs

Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : A) Monolithic kernel

Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : B) Monolithic kernel

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1) multi tasking 2) multi user 3) time sharing 4) None

Last Answer : 3) time sharing

Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1 multi tasking 2 multi user 3 time sharing 4 None

Last Answer : 3 time sharing

Description : I have a usb thumb drive that I think has some spyware and viruses on it how do I delete all the files or format it without infecting my pc?

Last Answer : well, you could smash it with a hammer, a rather crude way, but effective, otherwise you could take the risk, plug it in and reformat it, why do you think it has multiple spyware and virus files on it, and are they mount activated ?

Description : How can I understand my PC has junk files and viruses?

Last Answer : Hi, Yes you can easily say your computer hangs and gets you error messages. Then your computer is infected with viruses and has junk files. Your computer slows down completely.

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : A set of guidelines or standards that establish the format in which files can be transmitted from one computer to another is: a) Protocol for Files b) File Transfer Protocol c) Managing File Protocol d) None of These

Last Answer : b) File Transfer Protocol

Description : Which of the following statements is false concerning file names? a) Files may share the same name or the same extension but not both b) Every file in the same folder must have a unique name c) File extension is another name for file type d) None of these

Last Answer : d) None of these

Description : How do I unblock non-executable packages in Ubuntu?

Last Answer : answer:Well, you’ve already installed the Zune software haven’t you?, so running the installer again won’t accomplish much of use. Browse through your C_Drive folder and locate the .exe of the Zune software itself. Also, try Gnomad – it might work.

Description : Which of the following buttons do you click to pre-configure the fields in an executable transaction screen?

Last Answer : Variant

Description : Problems with using Lines of Code to measure the size of a product include(s) a) The creation of source code is only part of the development effort b) The Lines of Code (LOC) will differ between ... The final size (kLOC) can only be determined once the product is delivered e) All of the above.

Last Answer : e) All of the above.

Description : When the Captain cannot comply with an ATC clearance: a. The Captain must accept the ATC clearance, because it is based on a filed flight plan b. He/she may request an amended clearance and, if ... appropriate ATC must grant him/her that clearance d. He/she may suggest a new clearance to ATC

Last Answer : b. He/she may request an amended clearance and, if executable, he/she will accept that clearance

Last Answer : Size of the final executable can be reduced using dynamic linking for libraries.

Description : When the Captain cannot comply with an ATC clearance: a. The Captain must accept the ATC clearance, because it is based on a filed flight plan b. He/she may request an amended clearance and, if ... appropriate ATC must grant him/her that clearance d. He/she may suggest a new clearance to ATC

Last Answer : b. He/she may request an amended clearance and, if executable, he/she will accept that clearance

Description : Use of an executable model to represent the behavior of an object is called A. Simulation B. Software item C. Software feature D. None of the above

Last Answer : A. Simulation

Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing

Last Answer : B. Static testing

Description : Preparedstatement Object in JDBC is used to execute ........................... queries. A) executable B) simple C) high level D) parameterized

Last Answer : D) parameterized

Description : Prepared Statement object in JDBC used to execute........... queries. A) Executable B) Simple C) High level D) Parameterized

Last Answer : D) Parameterized

Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above

Last Answer : C) Implementation level

Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above

Last Answer : e) None of The Above

Description : Your father has died, and his will stipulates, that you must infect yourself with HIV, in order to get the money. You agree to the terms. How much money did you inherit?

Last Answer : So, what, we just make up a number here? In that case I inherited $1 trillion USD.