A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

1 Answer

Answer :

True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Related questions

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus

Last Answer : d) Computer Virus

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : .What is the main advantage of creating links to a file instead of copies of the file?

Last Answer : The main advantage is not really that it saves disk space (though it does that too) but, rather, that a change of permissions on the file is applied to all the link access points. The link will ... original. With copies you have to find all of the copies and change permission on each of the copies

Description : Secondary evidence of a document are- a) The copies made from with original b) The document itself produced for inspection of court c) Where a document is execute in counter part each counter ... executed by  one, against executors d) Where a document is executed in several parts each part

Last Answer : a) The copies made from with original

Description : The ………….. and …………… operations copies data from source range to target range and erases it from the source range. -Technology

Last Answer : The cut and paste operations copy data from the source range to a target range and erase it from the source range.

Description : Making illegal copies of copyrighted software is called …………………. (a) Software piracy -Technology

Last Answer : (a) Software piracy refers to making illegal copies of copyrighted software.

Description : A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus

Last Answer : C) Parasitic Virus

Description : Which field property specifies whether the field can be left empty when entering data into a record? -Technology

Last Answer : Required property.

Description : While entering a formula, cell address B$5 represents (a) Absolute Referencing -Technology

Last Answer : (b) It represents mixed reference because we are using $ sign before 5 only. Hence, as we will drag this only B will change but 5 will remain the same.

Description : The Fill handle tool is used for labor intensive entering data in a spreadsheet. -Technology

Last Answer : True Entering data into a spreadsheet can be very labor intensive, but Fill handle tool autofill the entries and save time.

Description : Name the devices : 1. This device constanUy looks at all the data entering and exiting your connection. -Technology

Last Answer : (i) Firewall is a device that looks at all the data entering and exiting connection. It can block or reject data in response to an established rule.(ii) A switch is an intelligent device ... several nodes to form a network and redirects the received information only to the intended node(s).

Description : A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns. A) Boot Sector Virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : B) Polymorphic Virus

Description : Promoter (A) Initiates a chemical reaction and is a catalyst by itself (B) Alters the position of equilibrium in a reversible reaction (C) Increases the number of active centres by increasing the unevenness of catalyst surface and by creating discontinuities in the crystals (D) All (A), (B) and (C)

Last Answer : (C) Increases the number of active centres by increasing the unevenness of catalyst surface and by creating discontinuities in the crystals

Description : What if technology is destroying jobs faster than it is creating them?

Last Answer : Yes, it is, and I think it’s a ship that has sailed.

Description : Sanchita is working for a nationalized bank and is in the process of creating a table to store the details of customers of the bank. -Technology

Last Answer : Primary key AccountNoCandidate key AccountNo and PAN NumberAlternate key PAN Number

Description : When creating a Web document, which unit is used to express an image’s height and width? (a) Centimetres (b) Pixels -Technology

Last Answer : (b) Image’s height and width unit are expressed in pixels or in percent form.

Description : What is table? Name the basic commands for creating a table. -Technology

Last Answer : Tables are made up of rows and columns. In HTML, tables are used to display tabular data in Web pages.The basic commands for creating tables are as follows:Table tags Row tags Cell tags andCaption tags .

Description : Carefully study the Web page given below. Identify 10 tags (structural as well as formatting tags) that have been utilized in creating this -Technology

Last Answer : 1. to specify title of the Web page.2. contains all the text content that is to be displayed on Web page and all the various formatting and structural tag.3. defines the most important and biggest ... provide caption to the table.9. used to create a table row.10. used to define data cells.

Description : What are the different ways in which you can start creating a new presentation? Write steps for each. -Technology

Last Answer : Creating New Presentation:For creating a new presentation in MS-PowerPoint, there are two options available to make a selection of creating new presentation:1. Creating Blank PresentationFor creating a blank presentation, ... name box, enter a new name to save the file.3. Then, click Save button

Description : What is Multimedia? What are the various types of hardware used in creating a multimedia project? -Technology

Last Answer : Multimedia is a means to process and structure information into a well-defined structure. Multimedia is called so because it incorporates many other media such as text, graphics, animation, audio ... following hardware devices - CPU, Monitor, Scanner, Touchscreen, Video grabbing card, mouse etc.

Description : When creating a Web document, what format is used to express an image's height and width? -Technology

Last Answer : Pixelsis used to express an image's height and width.

Description : While creating a table named “Employee”, Mr. Rishi got confused as which data type he should chose for the column “EName” out of char and varchar. -Technology

Last Answer : Varchar would be the suitable data type for EName column as char data type is a fixed length data type while varchar is a variable length data type.Any employee‟s name will be of variable length so it‟s advisable to choose varchar over char data type.

Description : Ms. Cathy is creating a form for Vidya University Sports Council application. Help her to choose the most appropriate controls -Technology

Last Answer : Appropriate controls for the given entries :S.NOFunctionControl1.To let the user enter NameTextField2.To let the user enter MOBILE NUMBERTextField3.To let the user choose one PROFESSION out of the ... , Yoga, Table Tennis, Badminton and Aerobics. More than one facility may be chosen.CheckBox

Description : While creating the table Student last week, Ms. Sharma forgot to include the column -Technology

Last Answer : ALTER TABLE Student ADD Game_Played VARCHAR (30) ;

Description : Sometimes the emotional stress resulting from fear of minor dangers is more harmful than the danger itself. Do you agree?

Last Answer : I go into mild shock whenever I give blood samples even though I tell myself it's ridiculous (it doesn't even hurt) but the shock still happens. My mother goes into shock when she see bees near her ... out, get up and limp away as a memory reaction to his puppyhood when one of his feet got broken.

Description : How does the body defend itself from microorganisms and other harmful substances that enter the airway during the breathing process?

Last Answer : The epithelium of the airway is a ciliated epithelium and has mucussecreting specialized cells. The secreted mucus covers the internal wall of the airway retaining organisms and foreign ... (sputum) and accidentally aspired objects. Breathing Process Review - Image Diversity: airway epithelium

Description : .Which one of the following conditions though harmful in itself, is also potential saviour from a mosquito borne infectious disease ? (a) Thalassaemia (b) Sickle cell anaemia (c) Pernicious anaemia (d) Leukaemia

Last Answer : (b) Sickle cell anaemia

Description : Data by itself is not useful unless (a) it is massive (b) it is processed to obtain information -Technology

Last Answer : (b) Data is unprocessed and raw facts. It is not useful unless it is processed to obtain information

Description : At what age do you think signs of a child's future behavior, good or bad, starts manifesting itself?

Last Answer : In a similar example to yours, I was hurrying my son who was less than two out the door for his swimming lesson and noticed he had stopped to straighten the door mat. He has continued to be extremely neat and organized.

Description : When Locke spokes of 'Tabula rasa' he referred to his belief that Options: A) The doctrine of innate ideas is essentially correct B) The organism reacts as a whole to stimulus C) The mind starts from scratch in gathering sense data D) The mind itself is a result of the process of evolution

Last Answer : D) The mind itself is a result of the process of evolution 

Description : How can a computer virus reproduce itself?

Last Answer : I think I have an idea of how this is done. If the program knows where it is located in the computer’s memory, it can run a loop to move each sequential line.

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Which mechanism is used by the computer virus ‘worm’ to duplicate itself? (1) Swap (2) Increment (3) Spawn (4) Swarm

Last Answer : Spawn

Description : The unordered list starts with ………….. tag. -Technology

Last Answer : The unordered list starts with tag.

Description : Which tag tells, where a link starts? (a) (b) -Technology

Last Answer : (c) tag specify that a link starts, in which, href create a hyperlink.

Description : Any formula in Excel starts with an …………….. -Technology

Last Answer : Any formula in Excel starts with anequal (=) sign.

Description : If the data entered in a cell is 546z then, Excel will treat it as a number because it starts with a digit. -Technology

Last Answer : False It will be treated as non-numeric data because it contains letters along with numbers.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.