_____are computer programs developed to harm and disrupt computers:
a) Malicious
b) Stanford
c) Stipulated
d) None of These

1 Answer

Answer :

a) Malicious

Related questions

Description : _____are attempt by individuals to obtain confidential information from you by falsifying their identity: a) Phishing Trips b) Computer Viruses c) Spyware Scams d) Viruses e) Phishing Scams

Last Answer : a) Phishing Trips

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : Why do malware writers create malicious programs?

Last Answer : Exactly as you stated: “to make other people’s lives difficult”. They get their own type of self-fulfillment out of it.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : What is clickjacking ? (1) Malicious technique of tricking Web usear into revealing confidential information (2) A device that sends and receives data in a bit second (3) A form of Computer Engineering (4) A digital process that is used to display an image on monitor

Last Answer : Malicious technique of tricking Web usear into revealing confidential information

Description : The original LISP machines produced by both LMI and Symbolics were based on research performed at A : CMU B : MIT C : Stanford University D : RAMD

Last Answer : B : MIT

Description : The original LISP machines produced by both LMI and Symbolics were based on research performed at A : CMU B : MIT C : Stanford University D : RAMD

Last Answer : B : MIT

Description : The original LISP machines produced by both LMI and Symbolics were based on research performed at A : CMU B : MIT C : Stanford University D : RAMD

Last Answer : B : MIT

Description : From where the term ‘hacker’ first came to existence? a) MIT b) Stanford University c) California d) Bell’s Lab

Last Answer : a) MIT

Description : What is the main difference between a mainframe and a super computer? A) Super computer is much larger than mainframe computers B) Super computers are much smaller than mainframe computers C) ... programs as possible while mainframe uses its power to execute few programs as fast as possible.

Last Answer : Answer : C

Description : A central computer that holds collections of data and programs for many PCs, workstations and other computers is a: a) supercomputer b) minicomputer c) laptop d) server e) None of The Above

Last Answer : d) server

Description : Which among the following is correct about the 'Artificial Intelligence': a) It is the science and engineering of making intelligent machines, especially intelligent computer programs. b) Artificial Intelligence is ... with making computers behave like humans. d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Related to computers, what is ‘Wetware’ ? (1) Computer programs (2) Circuitory (3) Human brain (4) Chemical storage devices

Last Answer : Human brain

Description : If we could drop an F5 tornado in the middle of a hurricane, would that disrupt it enough to dissipate it?

Last Answer : It might just be absorbed by the hurricane and make it even stronger.

Description : Do you think the ash cloud will spread worldwide and disrupt air travel everywhere--not just Europe?

Last Answer : Unlikely… However, that depends on: how long the eruption lasts, how much material is placed airborne, the grain shape and size of the material, the exhaust velocity of the volcano vent, and the velocity and direction of the winds aloft. So, too many variables to answer your question today.

Description : If you were an evil time traveler and wanted to disrupt world history as much as possible, what event during the 20th century would you change, and why?

Last Answer : I would start with J. P. Morgan. Destroy the American economy by stopping him from loaning to it, then hinting to Canada and Mexico that the U. S. would be ripe pickings. Then of course move on to ... . Do the same with Asia, and finally with Australia. Then, I would start an epic war between them.

Description : A wealthy wise old woman feared that her daughter was lazy and as a result rather stupid. When the old woman died, her will stipulated that her assets were to be liquidated and a check was to be ... only one envelope had a true statement and that the other two statements were false. The en -Riddles

Last Answer : The daughter should pick envelope 1. Unfortunately she picked envelope 3. Statements 1 and 2 were false, and the only true statement was statement 3. If the check was in envelope 1, that would make statement 1 ... both be true. If the check was in envelope 3, statements 1 and 3 would both be true.

Description : How does the warming of the world's oceans disrupt the flow of the water cycle?

Last Answer : It increases the amount of precipitation:)X4

Description : how so you stop a over actvine pain signal or disrupt its pathway?

Last Answer : Whar triggers pain in the body? its the internal alarm inside or out of human body via receptors travel to the brain and all the pain felt from that receptor..Advil and Tylenol temporarily blocks this receptor..to fool the brain that its ok for a while..how amazing the whole system our body evolve,

Description : How selected medical social and inherited factors disrupt body systems to cause ill health?

Last Answer : Many factors can cause ill health. Habits, or social factorssuch as smoking or drinking will damage the body. Medicaltreatments such as chemotherapy actually inject poison into thebody with negative side ... to disease such as Diabetes, Allergies,Heart disease and high cholesterol to name a few.

Description : How can blockchain disrupt banking and insurance?

Last Answer : Answers is the place to go to get the answers you need and to ask the questions you want

Description : A company can forfeit shares if the– (A) shareholder fails to pay the amount of the call during the stipulated time (B) shareholder pays calls in advance (C) shareholder does not pay the application money (D) shares have been issued at par

Last Answer : Answer: shareholder fails to pay the amount of the call during the stipulated time

Description : A single covalent bond (a) Is formed by the transfer of two electrons (b) Exists between hydrogen and chlorine in an aqueous solution, of hydrochloric acid (c) Is longer than a double bond (d) Does not require energy to disrupt it unlike an ionic bond

Last Answer : Ans:(c)

Description : An attestation engagement is one in which a CPA is engaged to: a. Assemble prospective financial statements based on the assumptions of the entity's management without expressing any Testify as an expert ... or prepare a tax return based on financial information the CPA has not audited or reviewed.

Last Answer : Issue a written communication expressing a conclusion about the reliability of a written assertion that is the responsibility of another party

Description : Which of the following is not a majoritarianism measure adopted by Sinhala community in Sri Lanka? a. To recognise Sinhala as the only official language. b. The governments followed preferential ... State Legislature. d. A new constitution stipulated that the state shall protect and foster Buddhism.

Last Answer : c. To give reservation of seats to Tamil community in the Central and State Legislature.

Description : Injury localized to the hypothalamus would most likely disrupt (a) short - term memory (b) co-ordination during locomotion (c) executive functions, such as decision making (d) regulation of body temperature.

Last Answer : d) regulation of body temperature.

Description : Administered prices are prices fixed by the government normally on the basis of ____________ 1. cost 2. margin of profit 3. cost plus a stipulated margin of profit 4. market forces 5. none of these

Last Answer : cost plus a stipulated margin of profit

Description : What is the full form of the MSP? a. Minimum Stock Price b. Minimum Statutory Price c. Maximum Stipulated Price d. Minimum Support Price

Last Answer : d. Minimum Support Price

Description : Which of the following criteria is a responsibility of DesignatedConsumer? a) designate or appoint an accredited Energy Auditor b) adhere to stipulated energy consumption norms and standards ... information every three years d) conduct energy audit through a certified energy auditor periodically

Last Answer : b) adhere to stipulated energy consumption norms and standards as notified

Description : Whose last words, as reported in his obituary in The Times, were alleged to have been: “Be natural my children. For the writer that is natural has fulfilled all the rules of art.”? His will stipulated that no memorial be erected to honour him.

Last Answer : Charles Dickens.

Description : Malicious Software is also known as: a) Statware b) Malware c) Dareware d) None of These

Last Answer : b) Malware

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Malicious users are also called as : a. External attackers b. Trusted users c. hacker d. Internal attackers

Last Answer : d. Internal attackers

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke

Last Answer : A. Security professional

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : Which of the following statement based describe a white hat hackers (a) Security professional (b) Former black hat (c) Former grey hat (d) Malicious hackers

Last Answer : (a) Security professional

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Why ABC is considered electro-mechanical computer? A) Because it was invented before electronic computers were developed B) Because there are wheels, drums, bars to rotate and move to produce result C) Because they use the flow of electrons in different component D) None of above

Last Answer : Answer : B

Description : Do car-sharing programs reduce harm to the environment?

Last Answer : I would bet that overall it reduces the number of miles driven. A lot of people use the logic I absolutely must own a car in order to ________ (buy groceries, take the dog to the vet, ... public transportation unless it has some other incentive (cheaper, don't have to worry about parking, etc.)

Description : Do car-sharing programs reduce harm to the environment?

Last Answer : I would bet that overall it reduces the number of miles driven. A lot of people use the logic I absolutely must own a car in order to ________ (buy groceries, take the dog to the vet, ... public transportation unless it has some other incentive (cheaper, don't have to worry about parking, etc.)

Description : By programmable machine we mean A) computers B) modern television C) washing machines D) anything that can be set to perform different tasks with suitable programs

Last Answer : Answer : A

Description : It is the set of programs that enables your computers hardware device and application software to work together. A. Operating system B. Helper software C. System software D. Application software

Last Answer : C. System software

Description : Which of the following is not an advantage of storied programs: a) Reliability b) Reduction in Operational Costs c) The Computers becoming general purpose d) None of The Above

Last Answer : b) Reduction in Operational Costs

Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology

Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm