……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

1 Answer

Answer :

Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Related questions

Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology

Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : ……… is a program that appears harmless but actually performs malicious functions. -Technology

Last Answer : Trojan horse is a program that appears harmless but actually performs malicious functions.

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : _____are computer programs developed to harm and disrupt computers: a) Malicious b) Stanford c) Stipulated d) None of These

Last Answer : a) Malicious

Description : The programmers who break into secure systems for malicious purpose are -Technology

Last Answer : (a) Crackers are the programmers that break into secure systems for malicious purpose.

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : ………. is a computer program that provides services to other computer programs. -Technology

Last Answer : Server is a computer program that provides services to other computer programs.

Description : Why do malware writers create malicious programs?

Last Answer : Exactly as you stated: “to make other people’s lives difficult”. They get their own type of self-fulfillment out of it.

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : Which software takes control of computer system on startup? (a) Compiler (b) Operating system (c) Application software (d) All of these -Technology

Last Answer : (b) Operating system takes control of computer system on startup.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : ………… is a program that mediates between application programs and hardware. -Technology

Last Answer : Operating systemis a program that mediates between application programs and hardware.

Description : Software that prevents unauthorized persons from accessing certain parts of a program, database or network is: a) Firewall b) Scanner c) Anti - Virus d) None of These

Last Answer : a) Firewall

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : The set of programs designed to perform user specific tasks is called application software. -Technology

Last Answer : TrueApplication software refers to the programs that perform operations for a specified task of a user.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : Where is the slimy little bugger (malicious program) hiding?

Last Answer : Did you make sure Malwarebytes was up to date? I’m kinda shocked it got past Malwarebytes, but it can happen if the program isn’t kept right up to date. Make sure all your protection is right up to date and scan again,I have been told some malware like to partly hide in windows office.

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : How do I stop Windows Update from continuously updating/downloading Windows Malicious Software Removal Tool?

Last Answer : Go to control panel, click on security, click on automatic updates, change the setting to notify me first.

Description : Malicious Software is also known as: a) Statware b) Malware c) Dareware d) None of These

Last Answer : b) Malware

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : Which of the following is not related to a utility software? (a) Text editor (b) Antivirus program (c) Disk compression software -Technology

Last Answer : (d) Railway reservation system is an example of application software whereas, rest all are software utilities.

Description : ……….. is a software program that provides a user interface to work with the file system. -Technology

Last Answer : File manageris a software program that provides a user interface to work with the file system.

Description : Is there software to remove the folders of programs I've uninstalled?

Last Answer : There is a program called Revo Uninstaller with a free version and a paid version. The free version is quite adequate. If you use Revo to unsinstall your programs it scans for leftover unused ... them automatically, with your approval. It also backs up the registry in case something goes wrong.

Description : Calcium is important in skeletal muscle contraction because it (a) binds to troponin to remove the masking of active sites on actin for myosin (b) activates the myosin ATPase by binding to it ... filament (d) prevents the formation of bonds between the myosin cross bridges and the actin filament.

Last Answer : (a) binds to troponin to remove the masking of active sites on actin for myosin

Description : Calcium is important in skeletal muscle contraction because it :- (1) binds to troponin to remove the masking of active sites on actin for myosin. (2) activates the myosin ATPase by binding to ... filament. (4) prevents the formation of bonds between the myosin cross bridges and the actin filament.

Last Answer : (1) binds to troponin to remove the masking of active sites on actin for myosin.

Description : What is clickjacking ? (1) Malicious technique of tricking Web usear into revealing confidential information (2) A device that sends and receives data in a bit second (3) A form of Computer Engineering (4) A digital process that is used to display an image on monitor

Last Answer : Malicious technique of tricking Web usear into revealing confidential information

Description : An electrical device which prevents an action from occurring until all other required conditions are met is called a/an ___________. A. limit B. monitor C. modulator D. interlock

Last Answer : Answer: D

Description : Given below are four methods (A-D) and their modes of action (i-iv) in achieving contraception. Select their correct matching from the four options that follow. Method Mode of Action A. The pill (i) Prevents sperms reaching cervix B. Condom ... D - (ii) (d) A - (iv), B - (i), C - (ii), D - (iii)

Last Answer : A – (iii), B – (i), C – (iv), D – (

Description : Which of the following approaches does not give the defined action of contraceptive? (a) Hormonal contraceptives Prevent/retard entry of sperms, prevent ovulation and fertilisation (b) ... devices Increase phagocytosis of sperms, suppress sperm motility and fertilising capacity of sperms

Last Answer : (b) Vasectomy Prevents spermatogenesis

Description : Which instrument detects the presence of an electric charge?

Last Answer : Answer: Electroscope

Description : What type of receptors detects changes in pressure or movement?

Last Answer : Mechanoreceptors

Description : The _____________ sensor,is a microphone type sensor that detects ping or pre-ignition noise so that the ignition timing can be retarded. a) throttle position b) manifold pressure c) camshaft position d) knock

Last Answer : Answer: d Explanation: The knock sensor,is a microphone type sensor that detects ping or pre-ignition noise so that the ignition timing can be retarded while the camshaft position sensor, senses ... the engine intake manifold so that the mixture strength can be adjusted with changes in engine load.

Description : Indian Railways detects the rail flow by A. Mitsubish Rail flow dector B. Soni Rail flow dector C. Audi-gauge Rail flow detector D. Kraut Kramer Rail flow detector.

Last Answer : D [Kraut Kramer Rail flow detector.]

Description : _________ detects the satellite signal relayed from the feed and converts it to an electric current, amplifies and lower its frequency. A. Horn antenna B. LNA C. Satellite receiver D. Satellite dish

Last Answer : B. LNA

Description : What is a device that detects both vertically and horizontally polarized signals simultaneously? A. Orthomode transducer B. Crystal detector C. Optoisolator D. Isomode detector

Last Answer : A. Orthomode transducer

Description : Which circuit detects frequency modulated signal? A. Modulator B. Discriminator C. Demodulator D. Modem

Last Answer : B. Discriminator

Description : ______ is a device that detects both vertically and horizontally polarized signals simultaneously. A. Crystal B. Orthomode transducer C. Light transducer D. Optoisolator

Last Answer : B. Orthomode transducer

Description : Accelerometer detects the A. small acceleration B. large acceleration C. small deceleration D. large acceleration and deceleration

Last Answer : large acceleration and deceleration

Description : Incorrect information results in unsatisfied preconditions for actions and plans _____________ detects violations of the preconditions for successful completion of the plan. a) Conditional Plan b) Conformant Planning c) Execution monitoring d) Both Conditional Plan & Execution monitoring

Last Answer : c) Execution monitoring

Description : _______ can detect burst error of length less than or equal to degree of the polynomial and detects burst errors that affect odd number of bits. a. Hamming Code b. CRC c. VRC d. None of the above

Last Answer : b. CRC

Description : Saponification number of an oil or fat (A) Gives an idea about its molecular weight (B) Is inversely proportional to its molecular weight (C) Detects its adulteration (D) All (A), (B) & (C)

Last Answer : (D) All (A), (B) & (C)

Description : A viral load test detects the A- provirus of HIV in infected cells B- .total amount of virus in the infected host C- number of viruses being released by each infected cell D- .amount of bacteriophage being produced by E. coli cells

Last Answer : provirus of HIV in infected cells

Description : A quorum sensing system A- .detects a signal from the external environment B- B.senses a compound produced by the bacterium itself C- consists of a sensor component that phosphorylates a regulatory protein D- .controls the activity of ribosomes directly

Last Answer : B.senses a compound produced by the bacterium itself