A malicious program that is used to remove all information from your computer is known as ……… -Technology

1 Answer

Answer :

A malicious program that is used to remove all information from your computer is known asthe sweeper.

Related questions

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : ……… is a program that appears harmless but actually performs malicious functions. -Technology

Last Answer : Trojan horse is a program that appears harmless but actually performs malicious functions.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : The programmers who break into secure systems for malicious purpose are -Technology

Last Answer : (a) Crackers are the programmers that break into secure systems for malicious purpose.

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : A malicious program that copies itself from computer to computer is - a. Spam b. Worm c. Trojan Horse d. None of the these

Last Answer : b. Worm

Description : What is clickjacking ? (1) Malicious technique of tricking Web usear into revealing confidential information (2) A device that sends and receives data in a bit second (3) A form of Computer Engineering (4) A digital process that is used to display an image on monitor

Last Answer : Malicious technique of tricking Web usear into revealing confidential information

Description : Where is the slimy little bugger (malicious program) hiding?

Last Answer : Did you make sure Malwarebytes was up to date? I’m kinda shocked it got past Malwarebytes, but it can happen if the program isn’t kept right up to date. Make sure all your protection is right up to date and scan again,I have been told some malware like to partly hide in windows office.

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : Which of the following is independent malicious program that need not any host program? A) Trap doors B) Trojan horse C) Virus D) Worm

Last Answer : D) Worm

Description : Malicious Software is also known as: a) Statware b) Malware c) Dareware d) None of These

Last Answer : b) Malware

Description : _____are computer programs developed to harm and disrupt computers: a) Malicious b) Stanford c) Stipulated d) None of These

Last Answer : a) Malicious

Description : ……. is an electronic device that manipulates information or data according to the set of instructions called program. -Technology

Last Answer : Computeris an electronic device that manipulates information or data according to the set of instructions called program.

Description : A search engine is a program to search (a) for information (b) Web pages -Technology

Last Answer : (d) A search engine is a software system that is designed to search for information on the Web pages.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : IBM is a well known computer and information technology company, what does IBM stand for?

Last Answer : International Business Machines

Description : ………. is a computer program that provides services to other computer programs. -Technology

Last Answer : Server is a computer program that provides services to other computer programs.

Description : …………. is a program interface that enables a user to communicate with computer through graphics or symbols. -Technology

Last Answer : GUI (Graphical User Interface) is a program interface that enables a user to communicate with computer through graphics or symbols.

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Are raccoons intelligent enough to be malicious?

Last Answer : I don’t think so. They can be quite vicious if cornered, they are good survivalists.

Description : How to stop Malicious location application?

Last Answer : Have her just take her phone to her phone carrier and have them find the program. Another possible way is reset her phone to factory setting. But make ... Google does the same thing I believe. http://www.newmediarights.org/how_toconsumercreator/how_identify_and_remove_cell_phone_tracking_software

Description : How do you deal with malicious people?

Last Answer : Just let it go and move on. Focus on the things that matter. You're going to encounter plenty of people like that but who they are is on them, it's not about you unless you let it be. You ... yourself and do your thing, which considering you're in a happy place seems to be working out pretty well.

Description : What can I do about a malicious Neighbor?

Last Answer : answer:Unless he's violating building codes, there's nothing that the law can do about what he builds on his property, or doesn't build. Likewise with trees. Is the tree exactly on your property line ... next door to him 15 years ago, what exactly started the pissing contest between the two of you?

Description : What can a hacker/malicious person do with just an IP address?

Last Answer : For some reason I think I heard this somewhere before I think they can be used and sold to set up a system failure on a different website with high security. If a mass quantity of IP ... website would crash. This would make it easier for someone to obtain information from a high security site.

Description : How do I stop Windows Update from continuously updating/downloading Windows Malicious Software Removal Tool?

Last Answer : Go to control panel, click on security, click on automatic updates, change the setting to notify me first.

Description : Why do malware writers create malicious programs?

Last Answer : Exactly as you stated: “to make other people’s lives difficult”. They get their own type of self-fulfillment out of it.

Description : Can .mp3 files contain anything malicious?

Last Answer : Yes. I’ve spent a lot of time at work deleting mp3 files from our servers that contained downloaded music from Limewire that were infected with viruses and malware.

Description : What file extension is most likely to contain a malicious code?

Last Answer : .bat

Description : What made it a crime to write or publish false scandalous and malicious criticisms of the government?

Last Answer : No

Description : What is an example of malicious code?

Last Answer : Some examples of malicious code would be Computer Viruses, logic bombs, spyware, and adware.

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : _______ is designed to be usedin wirelessapplications in which stations must be ableto sharethe medium without interception by an eavesdropperand without beingsubject tojamming from a malicious intruder. A) Spread spectrum B) Multiplexing C) Modulation D) None of the above

Last Answer : Spread spectrum

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Malicious users are also called as : a. External attackers b. Trusted users c. hacker d. Internal attackers

Last Answer : d. Internal attackers

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacke

Last Answer : A. Security professional

Description : Why would a hacker use a proxy server? a. To create a stronger connection with the target. b. To create a ghost server on the network. c. To obtain a remote access connection. d. To hide malicious activity on the network.

Last Answer : d. To hide malicious activity on the network.

Description : Which of the following statement based describe a white hat hackers (a) Security professional (b) Former black hat (c) Former grey hat (d) Malicious hackers

Last Answer : (a) Security professional

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : Which of the following statements best describes a white-hat hacker? A. Security professional B. Former black hat C. Former grey hat D. Malicious hacker

Last Answer : A. Security professional

Description : How can I avoid malicious websites?

Last Answer : Never click on, or copy and paste, links that are sent to you by people or companies you don't know. If you want to verify that the site is legitimate, type (don't copy) the homepage ... bar. When doing an online search, visit only results that are well known and trusted sources of information.

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above

Last Answer : d. All the above