Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie
Last Answer : a)Trojan Horse
Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology
Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.
Description : McAfee is an example of a) Photo Editing Software b) Quick Heal c) Virus d) Antivirus
Last Answer : d) Antivirus
Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus
Last Answer : A) Stealth virus
Description : I have a virus and I know the exact file it is from, but my pc will not allow me to delete it because it is "being used by another program" how do I get rid of this? My antivirus is doing nothing.
Last Answer : Fdisk it
Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie
Last Answer : A) Trojan Horse
Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these
Last Answer : b. Worm
Description : What is the significance of DNA being able to replicate itself?
Last Answer : What is the answer ?
Description : The only molecule in the living world that can replicate itself is (a) DNA (b) RNA (c) Both DNA and RNA (d) Neither DNA nor RNA
Last Answer : Ans:(a)
Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. a) True, False b) False, True c) True, True d) False, False
Last Answer : c) True, True
Description : Key logger is a a) Firmware b) Antivirus c) Spyware d) All of the above
Last Answer : c) Spyware
Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus
Last Answer : c) Logic Bomb
Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm
Last Answer : d)Worm
Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors
Last Answer : b)Virus
Description : When a virus enters a cell but does not replicate immediately, the situation is Called A.lysogeny B.fermentation C.symbiosis D.synergism
Last Answer : A.lysogeny
Description : What should be done to prevent the virus from invading the pen drive ?
Last Answer : answer:
Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology
Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.
Description : What is a light pen? a) A Mechanical Input device b) Optical input device c) Electronic input device d) Optical output device
Last Answer : b) Optical input device
Description : Which of the following is required when more than one person uses a central computer at the same time? A) Terminal B) Light pen C) Digitizer D) Mouse
Last Answer : Answer : A
Description : What is required when more than one person uses a central computer at the same time? A) Light pen B) Mouse C) Digitizer D) Terminal
Last Answer : Answer : D
Description : What is required when more than one persons use a central computer at the same time: a) Light Pen b) Mouse c) Terminal d) None of The Above
Last Answer : c) Terminal
Description : What is required when more than one person uses a central computer at the same time? a. Light pen b. Mouse c. Digitizer d. Terminal
Last Answer : d. Terminal
Description : Which of the following is required when more than one person uses a central computer at the same time? a. Terminal b. Light pen c. Digitizer d. Mouse
Last Answer : a. Terminal
Description : Virus can spread from one computer to another via use of: a) Infected Floppy Disk b) Computer Networks c) Internet d) All of Above e) None of These
Last Answer : d) All of Above
Description : Which of the following is a part of the Central Processing Unit? a) Printer b) Key board c) Mouse d) Arithmetic and Logic Unit
Last Answer : d) Arithmetic and Logic Unit
Description : Social Media Marketing means a) Activity of driving website traffic b) Up-to-the-minute way to spread the news of company c) Building a conversation between clients and consumers d) Above all are included
Last Answer : d) Above all are included
Description : Different strategies have been used in the women’s movement to a. Spread awareness b. Seek justice c. Fight discrimination d. All of the above
Last Answer : d. All of the above
Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above
Last Answer : c) Firewall
Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above
Last Answer : d. None of the above
Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above
Last Answer : d) All of the above
Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these
Last Answer : a. Vital Information Resouce Under Seize
Description : The factory system,automobile, telephone, radio, television, space program and nuclear powerhave all at one time or another been described as a. Democratizing forces. b. Liberating forces. c. Mobilizing forces. d. Both a. and b.
Last Answer : d. Both a. and b.
Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus
Last Answer : C) Parasitic Virus
Description : Which is considered a direct entry input device? A) Optical scanner B) Mouse and digitizer C) Light pen D) All of the above
Description : __________ is a handheld electro-optical pointing device. It is also called mouse pen. A. Joy Stick B. Light Pen C. Trackball D. Touch Screen
Last Answer : B. Light Pen
Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above
Last Answer : All of the above
Description : Which input devicecannot be used to work in MSOffice? A. Scanner B. Light Pen C. Mouse D. Joy Stick
Last Answer : Joy Stick
Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology
Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.
Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology
Last Answer : Worm is a software program that is designed to copy itself from one computer to another.
Description : An error in a computer program is known as _______: a) Crash b) Power Failure c) Bug d) Virus e) Fatal Error
Last Answer : c) Bug
Description : Do chromebooks have an antivirus? I gave myself a virus?
Last Answer : I am unaware of any antivirus for Chromebooks. Google builds antivirus into the OS, but that doesn't protect the computer from user error. Last year, I received a similar sounding email from a friend, ... make mistakes. I'm a very careful computer user, but I still revealed my password to a hacker.