Description : _____ infections have cost more money and taken more time to repair than any other virus type: a) File Infector Viruses b) Multi Partite Viruses c) Macro Viruses d) None of These
Last Answer : c) Macro Viruses
Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii
Last Answer : D) Non i and ii
Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus
Last Answer : d) Virus
Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus
Last Answer : C) Parasitic Virus
Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These
Last Answer : a) Trojan Horses
Description : contain library program have to be indicated to the loader. a. Externally defined b. Internally defined c. Executable file d. All of these
Last Answer : a. Externally defined
Description : Most viruses that infect plant possess (a) single-stranded DNA (b) single-stranded RNA (c) double-stranded DNA and RNA (d) double - stranded RNA only
Last Answer : Ans:(b)
Description : What is true about viruses without exception? (1) They contain a core of RNA (2) They can infect bacteria (3) They cannot produce antibodies (4) They can multiply only in host cells
Last Answer : (4) They can multiply only in host cells Explanation: Viruses do not contain enzymes for energy production or protein synthesis. For a virus to multiply, it must invade a host cell and direct the host ... proteins, and copies of its nucleic acid, using the host cell's ATP to power the reactions.
Description : .Viruses that infect bacteria multiply and cause their lysis, are called (a) lysozymes (b) lipolytic (c) lytic (d) lysogenic
Last Answer : (c) lytic
Last Answer : They can multiply only in host cells
Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime
Last Answer : (B) Danger of macro viruses
Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime
Last Answer : B. Danger of macro viruses
Description : A(n) _____ program is one that is ready to run and does not need to be altered in any way. a) Interpreter b) High level c) Compiler d) Executable e) None of these
Last Answer : d) Executable
Description : Compiling creates a(n)- 1) Program Specification 2) Algorithm 3) Executable Program 4) Subroutine
Last Answer : 3) Executable Program
Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above
Last Answer : d. None of the above
Description : The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: A. 000 B. 755 C. 744 D. 555 E. None of the above
Last Answer : B. 755
Description : A graph is said to be ……………… if the vertices can be split into two sets V1 and V2 such there are no edges between two vertices of V1 or two vertices of V2. A) Partite B) Bipartite C) Rooted D) Bisects
Last Answer : B) Bipartite
Description : Which of the following is the process of assembling program components, data, and libraries, and then compiling and linking these to create an executable system? a) System building b) Release management c) Change management d) Version management
Last Answer : a) System building
Description : When subroutine is called contents of program counter is location address of __ instruction following call instruction is stored on _ __and program execution is transferred to __ address. a. Non ... , Stack and Main program Cc. Executable, Queue and Subroutine d. Executable, Stack and Subroutine
Last Answer : d. Executable, Stack and Subroutine
Description : The ............... transfers the executable image of a C++ program from hard disk to main memory. (A) Compiler (B) Linker (C) Debugger (D) Loader
Last Answer : (D) Loader
Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors
Last Answer : b)Virus
Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors
Last Answer : B) Virus
Description : ________ is a program that places programs into memory and prepares them for execution. (1) Assembler (2) Compiler (3) Loader (4) Macro processor
Last Answer : Loader
Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above
Last Answer : c. Script virus
Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program
Last Answer : (B) provide a mechanism to map physical device to file names
Description : _____is a computer program that is loaded into a computer without the owner's knowledge: a) Hack Material b) Viruses c) Both of Above d) None of These
Last Answer : b) Viruses
Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These
Last Answer : b) Bugs
Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel
Last Answer : A) Monolithic kernel
Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel
Last Answer : B) Monolithic kernel
Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1) multi tasking 2) multi user 3) time sharing 4) None
Last Answer : 3) time sharing
Description : Allocation of a resources in a time dependent fashion to several program simultaneously called 1 multi tasking 2 multi user 3 time sharing 4 None
Last Answer : 3 time sharing
Description : I have a usb thumb drive that I think has some spyware and viruses on it how do I delete all the files or format it without infecting my pc?
Last Answer : well, you could smash it with a hammer, a rather crude way, but effective, otherwise you could take the risk, plug it in and reformat it, why do you think it has multiple spyware and virus files on it, and are they mount activated ?
Description : How can I understand my PC has junk files and viruses?
Last Answer : Hi, Yes you can easily say your computer hangs and gets you error messages. Then your computer is infected with viruses and has junk files. Your computer slows down completely.
Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network
Last Answer : d. block some hosts from accessing the network
Description : A set of guidelines or standards that establish the format in which files can be transmitted from one computer to another is: a) Protocol for Files b) File Transfer Protocol c) Managing File Protocol d) None of These
Last Answer : b) File Transfer Protocol
Description : Which of the following statements is false concerning file names? a) Files may share the same name or the same extension but not both b) Every file in the same folder must have a unique name c) File extension is another name for file type d) None of these
Last Answer : d) None of these
Description : How do I unblock non-executable packages in Ubuntu?
Last Answer : answer:Well, you’ve already installed the Zune software haven’t you?, so running the installer again won’t accomplish much of use. Browse through your C_Drive folder and locate the .exe of the Zune software itself. Also, try Gnomad – it might work.
Description : Which of the following buttons do you click to pre-configure the fields in an executable transaction screen?
Last Answer : Variant
Description : Problems with using Lines of Code to measure the size of a product include(s) a) The creation of source code is only part of the development effort b) The Lines of Code (LOC) will differ between ... The final size (kLOC) can only be determined once the product is delivered e) All of the above.
Last Answer : e) All of the above.
Description : When the Captain cannot comply with an ATC clearance: a. The Captain must accept the ATC clearance, because it is based on a filed flight plan b. He/she may request an amended clearance and, if ... appropriate ATC must grant him/her that clearance d. He/she may suggest a new clearance to ATC
Last Answer : b. He/she may request an amended clearance and, if executable, he/she will accept that clearance
Last Answer : Size of the final executable can be reduced using dynamic linking for libraries.
Description : Use of an executable model to represent the behavior of an object is called A. Simulation B. Software item C. Software feature D. None of the above
Last Answer : A. Simulation
Description : Verification performed without any executable code is referred to as A. Review B. Static testing C. Validation D. Sanity testing
Last Answer : B. Static testing
Description : Preparedstatement Object in JDBC is used to execute ........................... queries. A) executable B) simple C) high level D) parameterized
Last Answer : D) parameterized
Description : Prepared Statement object in JDBC used to execute........... queries. A) Executable B) Simple C) High level D) Parameterized
Last Answer : D) Parameterized
Description : ……………….. level is where the model becomes compatible executable code A) Abstract level B) Application level C) Implementation level D) All of the above
Last Answer : C) Implementation level
Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above
Last Answer : e) None of The Above
Description : Your father has died, and his will stipulates, that you must infect yourself with HIV, in order to get the money. You agree to the terms. How much money did you inherit?
Last Answer : So, what, we just make up a number here? In that case I inherited $1 trillion USD.