………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

1 Answer

Answer :

Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Related questions

Description : What’s the difference between a virus, a worm, a Trojan and spyware?

Last Answer : All these types of malicious software, or malware, pose a serious threat to your computer and data. 4 A virus invades a computer and copies, deletes or damages data. 4 A worm is a ... numerous pop-up ads, and may steal your personal information or change your computer settings without your knowing.

Description : Free adware/spyware/virus software for windows?

Last Answer : answer:ad-aware is good. spybot search & destroy too… A-squared has a free version. If you are computer savvy than I recommend HijackThis —— All of these can also be found at Major Geeks

Description : What type of anti virus software protects against spyware and viruses?

Last Answer : There are many different types of anti-virus software to choose from. Companies such as Norton and McAffee offer free trials and software you can purchase. There is also free anti-virus software that works just as well, such as AVG, avast!, and Malware Bytes.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : Which of the following statements regarding the transmission of infectious agents through blood transfusions is/are true? A. The transmission rates for human immunodeficiency virus (HIV) ... patients (such as patients undergoing transplantation) should receive specially screened blood products.

Last Answer : Answer: ABCD DISCUSSION: The incidence of both HIV and hepatitis transmitted via blood transfusions has been steadily decreasing since the 1980s. This is related to improved ... , severely compromised patients such as those undergoing transplantation should receive CMV-negative blood products

Description : What are the primary interest of online attackers in spyware? -Technology

Last Answer : Primary interest of online attackers in spyware is using it to steal personal information for financial crimes such as carding and identity theft or to sell that information to someone else who then executes more traditional financial crimes.

Description : What are the various measures that should be taken to prevent spyware from overtaking your system? -Technology

Last Answer : Preventions of SpywareDue to the seriousness of spyware and the harm, it can affect your system and personal information, it is highly recommended you to take the given measures to prevent ... and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system.

Description : Spyware is a type of malware but is not capable of collecting personal information. -Technology

Last Answer : False Spyware is a type of malware used to collect personal information without his or her knowledge.

Description : Is there a good integrated virus-and-spyware scanner available for Windows XP for free?

Last Answer : Go to www.avast.com and download their free home version. It is a very comprehensive security suite. It is free for private use, not for commercial, but it works on an honour system. Strangely they ... one year and you must pay for the software. I regard it as better than most commercial offerings.

Description : What is the best anti-virus/anti-spyware/anti-hacking program (free or not free) out there?

Last Answer : They are all very very similar, all of the big guys (Trend, Symantec, Macafee) collaborate on their virus definitions to lower development costs and to speed up the reaction time to outbreaks. The main ... computer I would simply find one that was on special and get it on the cheap. Cheers! Mike

Description : How to remove unwanted anti-virus spyware?

Last Answer : What OS are you running? Do you know the name of the program you are trying to remove? If it is a legitimate anti-malware app, you should be able to disable it through it's control panel or ... your data and reinstall your OS, then do a full scan with reliable anti-virus and anti-spyware apps.

Description : What is the best anti-virus/anti-spyware/anti-hacking & firewall program (free or not free) out there for APPLE MAC?

Last Answer : OSX. There are still 0 confirmed viruses for Macs running OSX. There are a couple Trojans, apparently, but you’d have to go looking for them to find them – and be pretty stupid to actually get infected by them. So, I wouldn’t consider it a problem worth worrying about on a Mac. Enjoy!

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : What is a good (highly) infectious virus to use as a base?

Last Answer : Probably Ebola

Description : The following statement(s) is/are true concerning newer detection methods of systemic infection. a. Enzyme-linked immunosorbent assay (ELISA) is a rapid immunologic assay used for ... detected using advanced molecular techniques include cytomegalovirus (CMV) and human immunodeficiency virus (HIV)

Last Answer : Answer: a, b, c, d Although the classic detection of infection based on clinical signs of infection and bacterial culture remain the most common clinical tools, increasing ... including CMV and HIV. Furthermore, preliminary investigations into possible detection of fungal pathogens are underway

Description : Common cold is not cured by antibiotics because it is (a) caused by a virus (b) caused by a Gram-positive bacterium (c) caused by a Gram-negative bacterium (d) not an infectious disease.

Last Answer : (b) caused by a Gram-positive bacterium

Description : Researchers have associated the ______ virus with infectious mononucleosis and have evidence that the virus also causes _______. a. Epstein-Barr; hepatitis B b. Epstein-Barr; Burkitt's lymphoma c. Coxsackie; hepatitis B d. Coxsackie; Burkitt lymphoma

Last Answer : d. Coxsackie; Burkitt lymphoma

Description : An example of a virus causing cytopathic effects is _____. a. Paraxyxoviruses causeing syncytia b. Infectious mononucleosis with foamy-llking cytoplasm c. Rabies causing Negri bodies d. A-C are correct

Last Answer : d. A-C are correct

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : The ………….. contains various options such as File, Edit, View etc. -Technology

Last Answer : The menu barcontains various options such as File, Edit, View etc.

Description : ……………… feature allows you to view different items such as comments, formatting etc. and also provides the option to view other author’s comments. -Technology

Last Answer : (c) Show Markup feature under Review tab allows you to view different items.

Description : Which feature of Word is used to create a set of documents, such as forms or letters etc. (a) Mail Merge -Technology

Last Answer : (a) Mail Merge feature is used to create a set of documents with minor differences like recipient’s name and address.

Description : Where would I find an Anti Spyware Software Redview?

Last Answer : You can find anti spyware software reviews online at many websites. This website compares anti-spyware softwares: http://anti-spyware-review.toptenreviews.com/.

Description : What is software you don't want hidden inside software you do want? a. Adware b. Trojan‐horse software c. Spyware d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not an example of worm? (a) MS_Blaster -Technology

Last Answer : (c) De bumper is a type of trojan horse.

Description : Which of the following statements is incorrect in the context of a worm? -Technology

Last Answer : (d) A worm is a self-replicating software and thus, it can travel on its own.

Description : A worm is a self_replicating program which eats up the entire disk space. -Technology

Last Answer : False Virus eats up the entire disk space.

Description : Animated movies, animated games etc, are some common applications of animation. What do you understand by the term animation? -Technology

Last Answer : Animation is a sequential series of still images that create an illusion of motion.

Description : Which of the following statement(s) is/are true concerning the treatment of MOFS? a. Prevention and therapy of MOFS requires control of the infectious or inflammatory source b. Restoration of normal ... of the nature of gut injury, total parenteral nutrition is preferred for most patients with MOFS

Last Answer : Answer: a, c The therapy of MOFS is directed towards interrupting the involving pathophysiologic process and providing an optimal physiologic environment for healing and recovery. ... Enteral absorption and processing of nutrients appears superior to TPN and lessens overall complications

Description : Infectious disease transmission during blood transfusions is of clinical significance to surgeons and of major importance to patients contemplating surgery potentially associated with the need for ... transmission in blood transfusions is significantly less than the risk of hepatitis transmission

Last Answer : Answer: c, d The most common infectious diseases transmitted during blood transfusions include viral hepatitis, CMV, and HIV infection. Post-transfusion hepatitis in 90% of cases consists of ... infectious disease transmission, the risks of HIV transmission is markedly less than that of hepatitis

Description : PKzip, Anti Virus etc. are examples of: a) Application Software b) Utilities Software c) System Software d) None of These

Last Answer : b) Utilities Software

Description : What is the origin of the propaganda term "Piracy" to refer to the copying of products and software?

Last Answer : I don’t know, but my best guess would date back to the pre-internet shareware days, where people would copy software on floppy disks.

Description : Paresthesia is the term used to refer to a) abnormal sensations. Abnormal sensations, such as burning, tingling, and numbness, are referred to as paresthesias. b) absence of muscle movement suggesting ... fasciculation. d) absence of muscle tone. A muscle which holds no tone is termed flaccid.

Last Answer : a) abnormal sensations. Abnormal sensations, such as burning, tingling, and numbness, are referred to as paresthesias.

Description : What is the term used in ecology to refer to a habitat zone such as a grassland or tundra, resulting from interaction of climate, biota (pron: bi-O-ta), and substratum?

Last Answer : ANSWER: BIOME (pron: BI-owm)

Description : The casual organism of Polio is - (1) A fungi (2) A virus (3) A worm (4) A bacteria

Last Answer : (2) A virus Explanation: Polio is a highly infectious disease caused by a virus. Its causative agent, poliovirus, was identified in 1908 by Karl Landsteiner. The polio virus invades the nervous system, and can cause total paralysis in a matter of hours.

Description : Polio disease is caused by - (1) Bacteria (2) Fungi (3) Virus (4) Worm

Last Answer : (3) Virus Explanation: Polio, or poliomyelitis, is a crippling and potentially deadly infectious disease. It is caused by the poliovirus.

Description : Which one of the following causes the Chikungunia disease? (1) Bacteria (2) Helminthic worm (3) Protozoan (4) Virus

Last Answer : (4) Virus Explanation: Humans and other primates are the natural hosts for the chikungunya virus. The virus is spread to humans by the bite of an infected female Aedes species mosquito.

Description : Which of the following diseases is caused by a virus? (1) Polimyletis (2) Malaria (3) Whooping cough (4) Ring worm

Last Answer : (1) Polimyletis Explanation: Poliomyelitis, often called polio or infantile paralysis, is an acute, viral, infectious disease spread from person to person, primarily via the fecal-oral ... , resulting in polioencephalitis, producing apnea that requires mechanical assistance such as an iron lung.

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Which of the following malicious programme do not replicate automatically a)Trojan Horse b)Virus c)Worm d)Zombie

Last Answer : a)Trojan Horse

Description : Which of the following is independent malicious program that need not any host programme- a)Trap doors b)Trojan horse c)Virus d)Worm

Last Answer : d)Worm

Description : A ______________is a program that can infect other programs by modifying them,the modification includes a copy of the virus program which can go on to infect other programs a)Worm b)Virus c)Zombie d) Trpdoors

Last Answer : b)Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is the fastest spreading Virus? a. Macro Virus b. Trojan Horse c. Worm d. I LOVE YOU Virus

Last Answer : d. I LOVE YOU Virus

Description : Which of the following is independent malicious program that need not any host program? i) Trap doors ii) Trojan horse iii) Virus iv) Worm

Last Answer : iv) Worm

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : A ………….. is a program that can infect other programs by modifying them, the modification includes a copy of the virus program, which can go on to infect other programs. A) Worm B) Virus C) Zombie D) Trap doors

Last Answer : B) Virus

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse