_____ infections have cost more money and taken more time to repair than any
other
virus type:
a) File Infector Viruses
b) Multi Partite Viruses
c) Macro Viruses
d) None of These

1 Answer

Answer :

c) Macro Viruses

Related questions

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : A program designed to destroy data on your computer which can travel to "infect" other computers is called as: a) Operational Risks b) Torpedo c) Infector d) Virus

Last Answer : d) Virus

Description : The following statement(s) is/are true concerning viral infections. a. The most common post-transplantation viral infections are caused by herpes viruses and include CMV and herpes simplex virus ... HSV) infection primarily presents with a mononucleosis-type syndrome with fever, lethargy, and cough

Last Answer : Answer: a, c, Solid organ transplant patients are prone to develop viral infection by virtue of exogenous immunosuppression. The most common post-transplantation viral infections are those ... transplant patient or as painful herpes zoster in patients who have previously developed chicken pox

Description : State whether the following statement is true. i) A macro virus is platform independent. ii) Macro viruses infect documents, not executable portions of code. A) i-only B) ii-only C) Both i and ii D) Non i and ii

Last Answer : D) Non i and ii

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Which of the following statements is wrong for viroids? (a) They cause infections. (b) Their RNA is of high molecular weight. (c) They lack a protein coat. (d) They are smaller than viruses

Last Answer : (b) Their RNA is of high molecular weight.

Description : What is a macro virus ?

Last Answer : This type of virus is often seen nowadays. Macro viruses are the first viruses to infect data files. Macro viruses are made up of macro or OLE objects and are very easy to write off from ... floppy disk or internal network of infected documents , e-mail attachments or file downloads on the Internet.

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses 

Description : A graph is said to be ……………… if the vertices can be split into two sets V1 and V2 such there are no edges between two vertices of V1 or two vertices of V2. A) Partite B) Bipartite C) Rooted D) Bisects

Last Answer : B) Bipartite

Description : The fecal-oral route is the mode of transmission for the _____. a. Hepatitis A virus. b. Hepatitis B virus. c. Hepatitis A and B viruses. d. All hepatitis viruses.

Last Answer : b. Hepatitis B virus.

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Is there any other medicine to be taken with Azitromycin to prevent bacterial infections and for how long ?

Last Answer : If azithromycin does not work , higher generation may be used subject to doctor's advice. It may take 5-6 days to eat even more , depending on the severity of the disease. However, it is better not to take antibiotics for minor problems.

Description : Gentamicin and other aminoglycoside drugs are widely prescribed for treatment of _____ infections. a. fungal b. gram-positive bacterial c. gram-negative bacterial d. staphylococcal

Last Answer : c. gram-negative bacterial

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns. A) Boot Sector Virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : B) Polymorphic Virus

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : The virus that are attached with vb and java files are called a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : c. Script virus

Description : The virus that are commonly found in word documents are called‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Macro b. Trojan horse c. Script virus d. None of the above

Last Answer : a. Macro

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : ........... is a large kernel, including scheduling file system, networking, device drivers, memory management and more. A) Monolithic kernel B) Micro kernel C) Macro kernel D) Mini kernel

Last Answer : A) Monolithic kernel

Description : ........... is a large kernel containing virtually the complete operating system, including, scheduling, file system, device drivers and memory management. A) Multilithic kernel B) Monolithic kernel C) Micro kernel D) Macro kernel

Last Answer : B) Monolithic kernel

Description : What type of anti virus software protects against spyware and viruses?

Last Answer : There are many different types of anti-virus software to choose from. Companies such as Norton and McAffee offer free trials and software you can purchase. There is also free anti-virus software that works just as well, such as AVG, avast!, and Malware Bytes.

Description : Which of the following oncogenic viruses was first detected? A.Rous sarcoma virus. B.Epstein-Barr virus C.Herpes simplex virus type 2 D.Human T cell leukaemia virus

Last Answer : A.Rous sarcoma virus.

Description : Which of the following viruses is most susceptible to acyclovir: A. Herpes simplex type I virus B. Herpes simplex type II virus C. Varicella-zoster virus D. Epstein-Barr virus

Last Answer : A. Herpes simplex type I virus

Description : Bacitracin, Polymyxin and Neomycin are used together for topical skin infections under the name of _____. a. Neosporin b. Vancomycin c. Cephalosporin d. Nystatin.

Last Answer : a. Neosporin

Description : Though few in number, some drugs, such as _____, can be used to treat some viral infections. a. penicillin and ampicillin b. isoniazid and dapsone c. amantadine and acyclovir d. streptomycin and amphotericin

Last Answer : c. amantadine and acyclovir

Description : Is it true that we still can't cure the common cold nor the flu virus, nor even most viruses?

Last Answer : Bacteria and viruses evolve constantly.

Description : Lysozyme that is present in perspiration, saliva and tears, destroys (a) certain types of bacteria (b) all viruses (c) most virus-infected cells (d) certain fungi.

Last Answer : (a) certain types of bacteria

Description : These viruses multiply first in the tonsils and then the lymphoid tissues of the gastrointestinal tract. a. Rabies virus b. Rotavirus c. Polio virus d. Hepatitis A virus

Last Answer : c. Polio virus

Description : A long thread-Like RNA virus is typical of the viruses. a. hepatitis C b. Ebola c. polio d. West Nile

Last Answer : b. Ebola

Description : Rivers' postulates can be used to a. locate an oncogene in a cell that is cancerous. b. develop inactivated viruses for use in a vaccine. c. eliminate viruses with certain chemical agents. d. relate a particular virus to a particular disease.

Last Answer : d. relate a particular virus to a particular disease.

Description : The virus(es) which can cause aseptic meningitis is/are A.Polioviruses B.Coxsackieviruses C.Echo viruses D.All of these

Last Answer : D.All of these

Description : Which of the following infection(s) can be diagnosed by the use of polymerase chain reaction? A- HIV-1 and HIV-2 viruses B- Hepatitis B virus C- Mycobacterium tuberculosis D- All of these

Last Answer : All of these

Description : A viral load test detects the A- provirus of HIV in infected cells B- .total amount of virus in the infected host C- number of viruses being released by each infected cell D- .amount of bacteriophage being produced by E. coli cells

Last Answer : provirus of HIV in infected cells

Description : Which of the following hepatitis viruses is not RNA virus? A- Hepatitis A virus B- Hepatitis B virus C- Hepatitis E virus D- Hepatitis G virus

Last Answer : Hepatitis B virus

Description : Recombination of virus genomes occurs A- by transduction B- by transcription C- simultaneous infection of a host cell by two viruses with homologous chromosomes D- by transformation

Last Answer : simultaneous infection of a host cell by two viruses with homologous chromosomes

Description : The primary North American vector transmitting arthropodborne virus encephalitis is the a) mosquito Arthropod vectors transmit several types of viruses that cause encephalitis. The primary vector in North America is ... the mosquito. d) flea. The primary vector in North America is the mosquito.

Last Answer : a) mosquito Arthropod vectors transmit several types of viruses that cause encephalitis. The primary vector in North America is the mosquito.

Description : Zidovudine inhibits the following virus/viruses: A. Human immunodeficiency virus B. Cytomegalovirus C. Hepatitis B virus D. Both 'A' and 'B'

Last Answer : A. Human immunodeficiency virus

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : Is there any way to "unstack" a PDF? In other words, can u take a multi-page PDF and separate the file into all single page PDFs?

Last Answer : You can use OS X preview to open the PDF and then print each page back into a PDF one at a time. Not very fast or elegant, though. I've used this tool before, also for OS X: ... that's apparently cross-platform; I can't speak to its quality, though: http://sourceforge.net/projects/pdfsam

Description : Ivanowsky, Beijerinck and Reed all began studies with particles smaller than the filters they were working with. This began the study of _____. a. measles b. viruses c. prions d. bacteria

Last Answer : b. viruses

Description : A computer which CPU speed around 100 million instruction per second and with the word length of around 64 bits is known as A) Super computer B) Mini computer C) Micro computer D) Macro computer

Last Answer : Answer : A

Description : The operation executed on data stored in registers is called_______ A. Macro-operation B. Micro-operation C. Bit-operation D. None of the Above

Last Answer : B. Micro-operation

Description : Power Point 97 incorporated the _______language , underlying all macro generation in office 97: a) Visual Basic for Applications b) Visual Basic for Software c) Virtual Base Language d) None of These

Last Answer : a) Visual Basic for Applications

Description :  ________ is a program that places programs into memory and prepares them for execution. (1) Assembler (2) Compiler (3) Loader (4) Macro processor

Last Answer : Loader

Description : Multi user systems provided cost savings for small business because they use a single processing unit to link several A) Personal computers B) Workstations C) Dumb terminals D) Mainframes

Last Answer : Answer : C