Which of the following is not the source of virus? -Technology

1 Answer

Answer :

Typing through key boardis not the source of virus.

Related questions

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : What is the method of viewing the source code of the current page in the Web browser? -Technology

Last Answer : Right click on the Web page and then select View Source from the context menu.

Description : Some features of a specific operating system are given below: 1. Free/Open source -Technology

Last Answer : (i) Linux(ii) With Linux, you get four desktop screens known as workspace.

Description : src attribute used with tag stands for (a) screen (b) screen resolution count (c) source -Technology

Last Answer : The correct answer is(c) source

Description : Which of the following feature is used to arrange the records in a data source before merging? (a) Filter (b) Sort -Technology

Last Answer : (b) Sort feature is used to arrange the records in a data source before merging.

Description : What is the name of the column heading for each category in a data source? (a) Data field (b) Field (c) Field name (d) Record -Technology

Last Answer : (c) Field name is the name of the column heading for each category in a data source.

Description : You cannot insert ………………… into a main document until after the data source has been created in Word. -Technology

Last Answer : fields into a main document until after the data source

Description : The ………….. and …………… operations copies data from source range to target range and erases it from the source range. -Technology

Last Answer : The cut and paste operations copy data from the source range to a target range and erase it from the source range.

Description : Which of the following are open source -Technology

Last Answer : XML is open source

Description : Why do librarians select open source library automation software? -Technology

Last Answer : Librarians select open source library automation software because of following advantages:i. It is normally available free of cost;ii. One can download it with the help of its source code for any type of library usageiii. One is allowed to modify its source code for satisfying his/ her requirements.

Description : What does Open_source in Open_ Source software mean? -Technology

Last Answer : Open-source software (OSS) is computer software with its source code made available. It is very often developed in a public, collaborative manner. A license for open sources software allows the end user to study, change and distribute the software for any purpose hence it is termed as Open Source.

Description : State whether True or False: i. A copyright is automatically granted to authors or creators of content. ii. In FOSS source code -Technology

Last Answer : i. Trueii. False

Description : What's the best anti-virus for best result's on my PC?

Last Answer : answer:Comodo is good, but not great. It is solid enough to keep you mostly safe, but I have yet to see it in any Top picks list. For anti-virus, I favor Avira Free. According to AV ... Avira is consistent). Other sources also place it pretty high, and it earns extra points as it is free.

Description : VIRUS stands for a) Very Intelligent Result Until Source b) Very Interchanged Resource Under Search c) Vital Information Resources Under Seize d) Viral Important Record User Searched

Last Answer : c) Vital Information Resources Under Seize

Description : Which statement is correct for bacterial transduction? (a) Transfer of some genes from one bacteria to another bacteria through virus. (b) Transfer of genes from one bacteria to another bacteria ... its DNA directly from mother cell. (d) Bacteria obtained DNA from other external source.

Last Answer : (a) Transfer of some genes from one bacteria to another bacteria through virus.

Description : Which statement is correct for bacterial transduction? (a) Transfer of some genes from one bacteria to another bacteria through virus. (b) Transfer of genes from one bacteria to another bacteria ... its DNA directly from mother cell. (d) Bacteria obtained DNA from other external source.

Last Answer : (a) Transfer of some genes from one bacteria to another bacteria through virus

Description : VIRUS stands for 1) Very Important Resource Under Search 2) Virtual Information Resource Under Resize 3) Verify Interchange Result Until Source 4) Very Important Record User Searched

Last Answer : 2) Virtual Information Resource Under Resize

Description : VIRUS stands for 1 Very Important Resource Under Search 2 Virtual Information Resource Under Resize 3 Verify Interchange Result Until Source 4 Very Important Record User Searched

Last Answer : 2 Virtual Information Resource Under Resize