What file extension is most likely to contain a malicious code?

1 Answer

Answer :

.bat

Related questions

Description : Can .mp3 files contain anything malicious?

Last Answer : Yes. I’ve spent a lot of time at work deleting mp3 files from our servers that contained downloaded music from Limewire that were infected with viruses and malware.

Description : Write the extension of HTML code file. -Technology

Last Answer : The extension of HTML code file is.html or .htm

Description : What is an example of malicious code?

Last Answer : Some examples of malicious code would be Computer Viruses, logic bombs, spyware, and adware.

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above

Last Answer : d. All the above

Description : What's causing this file name extension problem with Open Office?

Last Answer : Ok, so do you have the email open? Good. Save the second file – the one you can’t open – and if it doesn’t have .doc, go to the file and type that in. Then it should open as a doc.

Description : How do I open, or change over to .jpg, a .mix extension file?

Last Answer : Mix files seem to be the Microsoft Picture It format used by Microsoft’s PictureIt! I think some versions of MS Word will import them and from there you can Save As .jpg

Description : What is the difference between a lossy and a lossless file extension?

Last Answer : In a general sense, the lossy will loose something each time you save it wheras the lossless will not. This might clear it up

Description : .MOV' extension refers usually to what kind of file? -Technology

Last Answer : Animation/movie file

Description : Give one word for each of the following: 1. An audio file extension. 2. Ability to use information in a proper way. -Technology

Last Answer : 1. MP3 or WMA or WAVE or MIDI 2. Knowledge 3. JPEG or JPG or GIF or PNG or BMP 4. Adobe Flash 5. Sound Card

Description : The filename and file extension are separated by a period. -Technology

Last Answer : TrueThe filename and file extension are separated by a period because different, types of files store different types of information and each type of file has a file extension, which identifies the file type.

Description : File extension for a PowerPoint 2007 presentation is ………………. (a) .ptt (b) .pptx (c) .docx (d) .clsx -Technology

Last Answer : (b) .pptx is the file extension given to all PowerPoint 2007 files.

Description : What is the file extension used for a exported certificate backup file?

Last Answer : Need answer

Description : How do I file for an IRS extension?

Last Answer : In order to file for a tax extension, you will need to fill out form 4868 from the IRS. It can be found here: http://www.irs.gov/pub/irs-pdf/f4868.pdf If you don't want to ... and submitting it through your personal computer or a tax professional. More information is available from the above link."

Description : Find tax advice for e file tax extension?

Last Answer : The companies that provide tax extensions always know the most about it so your best bet is to go to turbotax online. They provide advice on how and where to start when getting extensions.

Description : Explain the following file extension related to library?

Last Answer : .pll,.lib,.pld The library pll files is a portable design file comparable to an fmb form file The library lib file is a plat form specific, generated library file comparable to a fmx form file The pld file is Txt format file and can be used for source controlling your library files Parameter

Description : Write the Abbreviation for the following File Extension 1. FMB 2. MMB 3. PLL?

Last Answer : FMB ----- Form Module Binary. MMB ----- Menu Module Binary. PLL ------ PL/SQL Library Module Binary.

Description : On successful compilation a file with the class extension is created. a) True b) False

Last Answer : a) True

Description : A _______ is a unique name that you give to a file of information: a) Device Letter b) File Name c) File Name Extension d) None of These

Last Answer : b) File Name

Description : Which of the following file extension is used for Audio or Sound : a) .wav b) .mp3 c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following file extension is used for Video : a) .mov b).mp c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which of the following file extension is used for Microsoft Power Point : a) .xls b) .ppt c) .dox d) None of These

Last Answer : b) .ppt

Description : Which of the following file extension is used for Microsoft Word : a) .doc b) .jpg c) .mp d) None of These

Last Answer : a) .doc

Description : .TXT extension refers usually refers to what kind of file: a) Text File b) Word File c) Web File d) None of These

Last Answer : a) Text File

Description : .docx is the file extension for: a) MS Power Point b) MS Excel c) MS Word d) None of These

Last Answer : c) MS Word

Description : A _______ is a collection of information saved as a unit: a) Folder b) File Extension c) File d) Path e) Print Out

Last Answer : c) File

Description : What is the file extension of MS - Word 2003 document: a) Dom b) Txt c) Doc d) None of The Above

Last Answer : c) Doc

Description : A ___________ is a unique name that you give to a file of information a) Device letter b) Folders c) File name d) File name extension e) None of these

Last Answer : d) File name extension

Description : Which of the following statements is false concerning file names? a) Files may share the same name or the same extension but not both b) Every file in the same folder must have a unique name c) File extension is another name for file type d) None of these

Last Answer : d) None of these

Description : What is the default file extension for all Word documents? 1) txt 2) wrd 3) doc 4) none of these

Last Answer : 3) doc

Description : Using gzip program an uncompressed file in the tar format is compressed in the zip format, by providing which extension ? a) tar b) tar.gz c) tar.gz d) zip

Last Answer : c) tar.gz

Description : The file extension of MS-Word document in Office 2007 is ................. (A) .pdf (B) .doc (C) .docx (D) .txt

Last Answer : Answer: C

Description : Which is not an extension of a picture file on a computer ? (1) .jpeg (2) .png (3) .gif (4) .mdb

Last Answer : .mdb 

Description : What is the most likely thing to happen if I must plug in the very short cord of a small electrical appliance into an extension cord or power strip rather than a wall outlet? What's the worst that could happen?

Last Answer : For some reason toasters have notoriously short cords and I've never received a reasonable excuse. The best I could come up with was that the cord was kept short to prevent the thing from falling ... has a 3 prong plug (grounded) you want a grounded extension cord plugged into a grounded outlet.

Description : Firms that use _______________ are less likely to damage theri reputation if a new product fails 1. individual branding 2. overall family branding 3. line family branding 4. brand extension branding 5. none of these

Last Answer : individual branding

Description : A marketer of industrial cleaning equipment is creating a marketing mix to satisfy potential customers. As a business to business marketer which of the following is LEAST likely to be ... -quality products C)Technical advice about the product D)Credit extension E)Extensive television advertising

Last Answer : E)Extensive television advertising

Description : Firms that use ----- are less likely to damage their reputations if a new product fails. A)individual branding B)overall family branding C)line family branding D)brand extension branding

Last Answer : A)individual branding

Description : Are raccoons intelligent enough to be malicious?

Last Answer : I don’t think so. They can be quite vicious if cornered, they are good survivalists.

Description : How to stop Malicious location application?

Last Answer : Have her just take her phone to her phone carrier and have them find the program. Another possible way is reset her phone to factory setting. But make ... Google does the same thing I believe. http://www.newmediarights.org/how_toconsumercreator/how_identify_and_remove_cell_phone_tracking_software

Description : Where is the slimy little bugger (malicious program) hiding?

Last Answer : Did you make sure Malwarebytes was up to date? I’m kinda shocked it got past Malwarebytes, but it can happen if the program isn’t kept right up to date. Make sure all your protection is right up to date and scan again,I have been told some malware like to partly hide in windows office.

Description : How do you deal with malicious people?

Last Answer : Just let it go and move on. Focus on the things that matter. You're going to encounter plenty of people like that but who they are is on them, it's not about you unless you let it be. You ... yourself and do your thing, which considering you're in a happy place seems to be working out pretty well.

Description : What can I do about a malicious Neighbor?

Last Answer : answer:Unless he's violating building codes, there's nothing that the law can do about what he builds on his property, or doesn't build. Likewise with trees. Is the tree exactly on your property line ... next door to him 15 years ago, what exactly started the pissing contest between the two of you?

Description : What can a hacker/malicious person do with just an IP address?

Last Answer : For some reason I think I heard this somewhere before I think they can be used and sold to set up a system failure on a different website with high security. If a mass quantity of IP ... website would crash. This would make it easier for someone to obtain information from a high security site.

Description : How do I stop Windows Update from continuously updating/downloading Windows Malicious Software Removal Tool?

Last Answer : Go to control panel, click on security, click on automatic updates, change the setting to notify me first.

Description : Why do malware writers create malicious programs?

Last Answer : Exactly as you stated: “to make other people’s lives difficult”. They get their own type of self-fulfillment out of it.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : The programmers who break into secure systems for malicious purpose are -Technology

Last Answer : (a) Crackers are the programmers that break into secure systems for malicious purpose.

Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology

Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.

Description : ……… is a program that appears harmless but actually performs malicious functions. -Technology

Last Answer : Trojan horse is a program that appears harmless but actually performs malicious functions.

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.