Which among the following is correct about the Antivirus Programs:
a) They contain a database of signatures for all known viruses and worms
b) The software searches a computer for the presence of these signatures
c) Both of Above
d) None of These

1 Answer

Answer :

c) Both of Above

Related questions

Description : A software that searches through a database of Web pages for particular information is known as (a) domain -Technology

Last Answer : (d) Search engine searches a software through a database of Web pages for particular information.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : Computer database searches can be done: a. With a computer with CD-ROM drive b. At the library c. Online d. All of the above

Last Answer : d. All of the above

Description : One of the problems with using SET protocol is a. the merchant's risk is high as he accepts encrypted credit card b. the credit card company should check digital signature c. the bank has to ... of all customers d. the bank has to keep a database of digital signatures of all customers 

Last Answer : c. the bank has to keep a database of the public keys of all customers

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Which among the following is correct about the 'Artificial Intelligence': a) It is the science and engineering of making intelligent machines, especially intelligent computer programs. b) Artificial Intelligence is ... with making computers behave like humans. d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which one of the following is a system software ? (1) Database programs (2) Word processors (3) Spreadsheets (4) Compilers

Last Answer : Compilers

Description : Which one of the following statements about viruses is correct? (a) Viruses possess their own metabolic system. (b) All viruses contain both RNA and DNA. (c) Viruses are obligate parasites. (d) Nucleic acid of viruses is known as capsid.

Last Answer : (c) Viruses are obligate parasites.

Description : Which is/are the main provisions of Information Technology (IT) Act, 2000? 1) Finalisation of contracts through electronic media. 2) Legal recognition to digital signatures and documents. 3) Making hacking with computer system an office. 4) All of the above

Last Answer : 4) All of the above

Description : Which among the following is correct regarding the Boot Sector Viruses: a) These viruses are resides in the boot sector of a floppy or hard disk. b) Such viruses are activated every time a computer ... uninfected floppy disk is inserted into the floppy drive d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is incorrect about application software: a) It consists of standalone programs b) Used to solve specific business needs c) Both of Above d) None of These

Last Answer : d) None of These

Description : In the question a part of the sentence is given in BOLD. Alternatives to the BOLD part are given which may improve the construction of the sentence. Select the correct alternative. There are not many men who ... to by their short names only (a) initials (b) signatures (c) pictures (d) middle names

Last Answer : (a) initials

Description : Which among the following is correct about Machine Language: a) Each computer can only understand programs that are written in its own Machine Language b) Machine Language is provided by the computer manufacturer ... at the most basic level of computer operation e) All of the Above f) None of These

Last Answer : e) All of the Above

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : Which among the following definitions are correct: a) Epistemology - It is a study of the kinds of knowledge that are required for solving problems in the world b) Ontology - It is the study of the ... basic properties are. Emphasis on ontology begins in the 1990s. c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Errors in a software program are referred to as: a) Viruses b) Bugs c) Computer Fault d) None of These

Last Answer : b) Bugs

Description : Fill in the blanks (i) Viruses, worms and trojans are collectively named ________________. -Technology

Last Answer : (i) Malware(ii) (iii) Web browser(iv) Website(v) (vi) Worm(vii) href(viii) Spyware(ix) Quotes(x) Trojan Horse

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : List some commonly available antivirus programs. -Technology

Last Answer : Some of the commonly available antivirus programs in the market are as follows:1. Symantec Norton antivirus2. AVG antivirus3. McAfee scan4. Quick Heal

Description : What are best antivirus programs in 2021?

Last Answer : Puedes usar Avast Free Antivirus.h ttps ://y azing .co m/deal s/bluehost /Juan_ Pablo (borra los espacios es un código de afiliación con descuento)

Description : How to Use a Wacom Bamboo Tablet to Draw, Make Art, Produce Signatures on Your Computer?

Last Answer : Wacom has been an industry name for some time now, having first entered the tablet peripheral game in 1992 and capturing the lion’s share (over 80% in both Japan and abroad) of the ... designer out there as imagery and image creation moves into the 21st century, largely leaving paper behind.

Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which type of file is created by Word Processing Programs? 1) Database File 2) Storage File 3) Worksheet File 4) Document File

Last Answer : 4) Document File

Description : Computer software includes_______and their associated documentation: a) Computer Programs b) Libraries c) Both of the Above d) None of These

Last Answer : c) Both of the Above

Description : How does an antivirus software protect your computer?

Last Answer : Protecting your computers and mobile phones with an all-in-one PC security software has become essential in today's internet world. Antivirus software blocks the intrusion of Computer Viruses and ... data recovery system will help you eliminate the malware making your system or file malware-free.

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following is correct about ''Intelligent Agent": a) It is a system that perceives its environment and takes actions which maximize its chances ofsuccess. b) The simplest intelligent agents are ... organizations of human beings (such as firms) d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which of the following is not anti-viruses software? A) NAV B) F-Prot C) Oracle D) McAfee

Last Answer : Answer : C

Description : The programs which are as permanent as hardware and stored in ROM is known as A) Hardware B) Software C) Firmware D) ROM ware

Last Answer : Answer : C

Description : Programs designed to perform specific tasks is known as A) system software B) application software C) utility programs D) operating system

Last Answer : Answer : B

Description : The programs which are as permanent as hardware and stored in ROM is known as 1) Hardware 2) Software 3) Firmware 4) Services

Last Answer : 2) Software

Description : What is true about viruses without exception? (1) They contain a core of RNA (2) They can infect bacteria (3) They cannot produce antibodies (4) They can multiply only in host cells

Last Answer : (4) They can multiply only in host cells Explanation: Viruses do not contain enzymes for energy production or protein synthesis. For a virus to multiply, it must invade a host cell and direct the host ... proteins, and copies of its nucleic acid, using the host cell's ATP to power the reactions.

Description : Transposons are of particular significance because they a. often contain genes for antibiotic resistance. b. inhibit the effects of overlapping genes. c. come in pairs and often are associated with viruses. d. regulate gene transcription in bacterial cells.

Last Answer : a. often contain genes for antibiotic resistance.

Description : What is true about viruses without exception? (1) They contain a core of RNA (2) They can infect bacteria (3) They cannot produce antibodies (4) They can multiply only in host cells 

Last Answer : They can multiply only in host cells

Description : Why do people put their email addresses in their email signatures?

Last Answer : I don’t do that myself (I do include my website, which is also kind of a “well duh” move). My best guess is that it’s easy to cut and paste into an address book that way. My pet peeve is people who put something like “A message from Joe Blow” in the subject line. Speaking of “well duh”...

Description : How many signatures do I need to submit a referendum in Hungary? Now they want to start a referendum on the Olympics. How many signatures are currently being held?  

Last Answer : 110,000 signatures have been collected so far, and I think 200,000 signatures are needed for a referendum to begin. According to the statements, approx. 10-15 percent of signatures may be invalid ... only the people of Budapest will do well, as the developments in Budapest will gain momentum.   

Description : How Contracts and Electronic Signatures Impact Small Business?

Last Answer : The rapid advances in technology have ultimately led toelectronic signatures replacing a printed copy of a contract.Before the Electronic Signatures in Global and National CommerceAct (ESIGN) was ... the U.S. have adopted the UniformElectronic Transactions Act (UETA), which provides intrastate

Description : i recieved a signed limited edition heisman trophy football. one of the signatures could be the first heisman trophy winner from 1935. how can i make sure of this signature and how can i find out how much this football might be worth?

Last Answer : There are professionals who specialize in Sports Memorabilia who can verify the authenticity of the signature by comparing it to bonafide examples. Given your New Jersey location, contact GrandStand Sports Memorabilia in New York City at 1-888-78-GRAND. Someone there can direct you to the next step.

Description : What do you call a short bit sequence sent typically 128 bits in digital signatures? A. Hash B. Public key C. Private key D. Password

Last Answer : A. Hash

Description : Court will take judicial notice of the following - a) All laws in force in territory of India b) The accession to office names, titles, functions and signatures of the persons filling  for the ... of hostilities between the  Government of India and any other state or body d) All the above

Last Answer : d) All the above

Description : When a method in a subclass has the same name and type signatures as a method in the superclass, then the method in the subclass .................. the method in the superclass. (A) Overloads (B) Friendships (C) Inherits (D) Overrides

Last Answer : (D) Overrides

Description : Software refers to ____ A. firmware B. physical components that a computer is made of C. programs D. None of the above

Last Answer : C. programs

Description : Computer systems are comprised of: a) Hardware, Software, Procedures, Networks and People b) Hardware, Programs, Processors, Procedures and People c) Hardware Programs, Information, People and Networks d) None of These

Last Answer : a) Hardware, Software, Procedures, Networks and People