Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : c. Denial‐of‐service attack
Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : d. None of the above
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : Which of the following applies to the implementation of an idea? a) Copyright b) Intellectual property c) Patent d) Denial of service attack
Last Answer : c) Patent
Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse
Last Answer : B) Zombie
Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie
Last Answer : a)Trojan Horse
Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm
Last Answer : d)Worm
Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors
Last Answer : b)Virus
Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus
Last Answer : d. I LOVE YOU Virus
Description : What slows runoff rain water helping to prevent floods and erosion?
Last Answer : water shed
Description : What is the purpose of a Denial of Service attack? a. Exploit a weakness in the TCP/IP stack b. To execute a Trojan on a system c. To overload a system so it is no longer operational d. To shutdown services by turning them off
Last Answer : c. To overload a system so it is no longer operational
Description : Explain denial of service attack. -Technology
Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.
Description : Denial - of - service attack includes: a) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic b) DoS attacks are included in it. c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack
Last Answer : c. Patent
Description : An attacker sits between customer and Banker, and captures the information from the customer and retransmits to the banker by altering the information. This attack is called as .............. (A) Masquerade Attack (B) Replay Attack (C) Passive Attack (D) Denial of Service Attack
Last Answer : (B) Replay Attack
Description : An attacker sits between the sender and receiver and captures the information and retransmits to the receiver after some time without altering the information. This attack is called as .............. (A) Denial of service attack (B) Masquarade attack (C) Simple attack (D) Complex attack
Last Answer : (A) Denial of service attack
Description : The major effects of floods are a. Physical damage b. Loss of biodiversity c. Scarcity of water supply d. All of the above
Last Answer : d. All of the above
Description : Which is the main cause of cholera? a. Poor sanitation b. Floods c. Air pollution d. Poor nutrition
Last Answer : a. Poor sanitation
Description : The major man made causes of floods are a. Deforestation b. Siltation c. Bursting of dam d. All of the above
Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these
Description : How many computers and/or iPads could connect to a single Internet home service before it slows down to a crawl?
Last Answer : answer:We have three attached to AT@T and Yahoo. All three online at the same time has had no slow down time. Having four may be another story, altogether. Best bet is have all four online at the same time and monitor the results of any slowdown time.
Description : State whether true of false. i) A worm mails a copy of itself to other systems. ii) A worm executes a copy of itself on another system. a) True, False b) False, True c) True, True d) False, False
Last Answer : c) True, True
Description : …………… programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. a) Zombie b) Worm c) Trojan Horses d) Logic Bomb
Last Answer : c) Trojan Horses
Description : The term used to describe a terrorist attack on a computer information system is- a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Last Answer : b. Cyber Terrorism
Description : The term used to describe a terrorist attack on a computer information system is a. Cyber Attack b. Cyber Terrorism c. Time Bomb d. None of the these
Description : Which will not harm computer resources? a) Virus b) Trojan horse c) Firewall d) None of the above
Last Answer : c) Firewall
Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus
Last Answer : d) Computer Virus
Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above
Last Answer : d) All of the above
Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these
Last Answer : a. Vital Information Resouce Under Seize
Description : The type of website that is designed to build customer goodwill and to supplement other sales channels rather than sell the company's products directly is known as a -------- website a. customer service b. click-and mortar c. marketing d. corporate
Last Answer : b. click-and mortar
Description : The best way to promote a business with social media is a. to advertise your company, service and products b. to collect as many contacts as possible c. offer a lot of helpful and free information d. invite potential clients to visit your website.
Last Answer : c. offer a lot of helpful and free information
Description : Every time I logon to the website, my browser crashes, how do I get technical support?
Last Answer : It really depends on what web browser you are using. If you are using Firefox, you can go to Mozilla.org for support and downloads. For internet explorer, you need to use Microsoft.com for support.
Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology
Last Answer : 1. True2. True3. False4. False
Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors
Description : Which will harm computer resources a. Worm b. Virus c. Trojan horse d. All the above
Last Answer : d. All the above
Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm
Last Answer : Spawn
Description : If sound travels through matter (air) and gas is a medium then what medium slows down the flow of sound the most?
Last Answer : Vacuum.
Description : What takes place when moving water slows down?
Last Answer : It will start to freezes
Last Answer : 1. Delete unnecessary apps. 2. Keep a backup of the apps that you use for many days and delete them , then install them again when needed. 3. Create a custom ROM , do a Google search and you will ... . A: If you support the app on Unroot Android and you need to root the phone to get full support.
Description : Is that true?
Last Answer : Yes, it can. Smoking intoxicates the body - and any poisons can affect its development.
Description : What a period called when there business activity slows down prices and wages falls and unemployment rises?
Last Answer : That is a recession.
Description : Why isostatic rebound slows down over time?
Last Answer : Feel Free to Answer
Description : Why does a skateboard moving on a falt surface slows down and comes to a stop?
Last Answer : Need answer
Description : When an object that is moving slows down, which action must be occurring?
Last Answer : friction
Description : Refrigeration is a process which – (1) kills bacteria (2) slows down the bacterial growth (3) Inactivates the bacteria (4) Plasmolyses the bacteria
Last Answer : (2) slows down the bacterial growth Explanation: Bacteria thrive in warm, moist conditions. Refrigeration allows the temperature to be lowered so far that food can be stored for days or even months. ... at or below 4°C) slows down bacterial growth which helps reduce the risk of food borne illness.