A _______ is a computer program that can replicate itself and spread from one
computer to another.
a) Antivirus
b) Pen Drive
c) Mouse
d) Computer Virus

1 Answer

Answer :

d) Computer Virus

Related questions

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : McAfee is an example of a) Photo Editing Software b) Quick Heal c) Virus d) Antivirus

Last Answer : d) Antivirus

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : I have a virus and I know the exact file it is from, but my pc will not allow me to delete it because it is "being used by another program" how do I get rid of this? My antivirus is doing nothing.

Last Answer : Fdisk it

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : What is the significance of DNA being able to replicate itself?

Last Answer : What is the answer ?

Description : The only molecule in the living world that can replicate itself is (a) DNA (b) RNA (c) Both DNA and RNA (d) Neither DNA nor RNA

Last Answer : Ans:(a)

Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. a) True, False b) False, True c) True, True d) False, False

Last Answer : c) True, True

Description : Key logger is a a) Firmware b) Antivirus c) Spyware d) All of the above

Last Answer : c) Spyware

Description : The …………….. is code embedded in some legitimate program that is set to “explode” when certain conditions are met. a) Trap doors b) Trojan horse c) Logic Bomb d) Virus

Last Answer : c) Logic Bomb

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : When a virus enters a cell but does not replicate immediately, the situation is Called A.lysogeny B.fermentation C.symbiosis D.synergism

Last Answer : A.lysogeny

Description : When a virus enters a cell but does not replicate immediately, the situation is Called A.lysogeny B.fermentation C.symbiosis D.synergism

Last Answer : A.lysogeny

Description : What should be done to prevent the virus from invading the pen drive ?

Last Answer : answer:

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : What is a light pen? a) A Mechanical Input device b) Optical input device c) Electronic input device d) Optical output device

Last Answer : b) Optical input device

Description : Which of the following is required when more than one person uses a central computer at the same time? A) Terminal B) Light pen C) Digitizer D) Mouse

Last Answer : Answer : A

Description : What is required when more than one person uses a central computer at the same time? A) Light pen B) Mouse C) Digitizer D) Terminal

Last Answer : Answer : D

Description : What is required when more than one persons use a central computer at the same time: a) Light Pen b) Mouse c) Terminal d) None of The Above

Last Answer : c) Terminal

Description : What is required when more than one person uses a central computer at the same time? a. Light pen b. Mouse c. Digitizer d. Terminal

Last Answer : d. Terminal

Description : Which of the following is required when more than one person uses a central computer at the same time? a. Terminal b. Light pen c. Digitizer d. Mouse

Last Answer : a. Terminal

Description : What is required when more than one person uses a central computer at the same time? a. Light pen b. Mouse c. Digitizer d. Terminal

Last Answer : d. Terminal

Description : Which of the following is required when more than one person uses a central computer at the same time? a. Terminal b. Light pen c. Digitizer d. Mouse

Last Answer : a. Terminal

Description : Virus can spread from one computer to another via use of: a) Infected Floppy Disk b) Computer Networks c) Internet d) All of Above e) None of These

Last Answer : d) All of Above

Description : Which of the following is a part of the Central Processing Unit? a) Printer b) Key board c) Mouse d) Arithmetic and Logic Unit

Last Answer : d) Arithmetic and Logic Unit

Description : Social Media Marketing means a) Activity of driving website traffic b) Up-to-the-minute way to spread the news of company c) Building a conversation between clients and consumers d) Above all are included

Last Answer : d) Above all are included

Description : Different strategies have been used in the women’s movement to a. Spread awareness b. Seek justice c. Fight discrimination d. All of the above

Last Answer : d. All of the above

Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above

Last Answer : c) Firewall

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize

Description : The factory system,automobile, telephone, radio, television, space program and nuclear powerhave all at one time or another been described as a. Democratizing forces. b. Liberating forces. c. Mobilizing forces. d. Both a. and b.

Last Answer : d. Both a. and b.

Description : The factory system,automobile, telephone, radio, television, space program and nuclear powerhave all at one time or another been described as a. Democratizing forces. b. Liberating forces. c. Mobilizing forces. d. Both a. and b.

Last Answer : d. Both a. and b.

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : Which is considered a direct entry input device? A) Optical scanner B) Mouse and digitizer C) Light pen D) All of the above

Last Answer : Answer : D

Description : __________ is a handheld electro-optical pointing device. It is also called mouse pen. A. Joy Stick B. Light Pen C. Trackball D. Touch Screen

Last Answer : B. Light Pen

Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above

Last Answer : All of the above

Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above

Last Answer : All of the above

Description : Which input devicecannot be used to work in MSOffice? A. Scanner B. Light Pen C. Mouse D. Joy Stick

Last Answer : Joy Stick

Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above

Last Answer : d. All of the above

Description : Which is considered a direct entry input device? a. Optical scanner b. Mouse and digitizer c. Light pen d. All of the above

Last Answer : d. All of the above

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : An error in a computer program is known as _______: a) Crash b) Power Failure c) Bug d) Virus e) Fatal Error

Last Answer : c) Bug

Description : Do chromebooks have an antivirus? I gave myself a virus?

Last Answer : I am unaware of any antivirus for Chromebooks. Google builds antivirus into the OS, but that doesn't protect the computer from user error. Last year, I received a similar sounding email from a friend, ... make mistakes. I'm a very careful computer user, but I still revealed my password to a hacker.