One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

1 Answer

Answer :

(d) Antivirus can detect only those viruses for which they are programmed.

Related questions

Description : List some commonly available antivirus programs. -Technology

Last Answer : Some of the commonly available antivirus programs in the market are as follows:1. Symantec Norton antivirus2. AVG antivirus3. McAfee scan4. Quick Heal

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Write one advantage and one limitation of E_mail over traditional mail. -Technology

Last Answer : Advantages1. E-mail is extremely cost effective.2. E-mail takes lesser time for transmitting data than conventional mail.Disadvantage1. Need of Internet connection to send/receive mail.

Description : Which of the following is not related to a utility software? (a) Text editor (b) Antivirus program (c) Disk compression software -Technology

Last Answer : (d) Railway reservation system is an example of application software whereas, rest all are software utilities.

Description : What does an antivirus software do? -Technology

Last Answer : 1. Antivirus software is a computer program that detects, prevents and takes action to disarm or remove malicious software programs, such as viruses and worms.2. Displays health of your computer system.

Description : What does an antivirus software do? Explain in brief with any two points. -Technology

Last Answer : 1. Antivirus software is a computer program that detects, prevents and takes action to disarm or remove malicious software programs, such as viruses and worms.2. Displays health of your computer system.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : Which of the following is not antivirus software? (a) Norton Antivirus -Technology

Last Answer : (b) Melissa is a macro virus, not an antivirus.

Description : SmartCop is an antivirus developed in India. -Technology

Last Answer : True SmartCop antivirus is developed in India.

Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : What are best antivirus programs in 2021?

Last Answer : Puedes usar Avast Free Antivirus.h ttps ://y azing .co m/deal s/bluehost /Juan_ Pablo (borra los espacios es un código de afiliación con descuento)

Description : Please, someone tell me that this reaction to Oregon's self-serve gas pump thing is some kind of hoax! People aren't really behaving this way, are they?

Last Answer : Here you go.

Description : After looking at his data, Stefan focuses his study on understanding why people are behaving as they are. Which research orientation is he using?

Last Answer : Interpretive sociology

Description : How do I get one of my family's cats to stop behaving like a human?

Last Answer : If you restrict the people food from her, she’ll be forced to eat hers. They won’t starve themselves.

Description : What is the English language of behaving like a fool ?

Last Answer : To make an ass of oneself .

Description : Do chromebooks have an antivirus? I gave myself a virus?

Last Answer : I am unaware of any antivirus for Chromebooks. Google builds antivirus into the OS, but that doesn't protect the computer from user error. Last year, I received a similar sounding email from a friend, ... make mistakes. I'm a very careful computer user, but I still revealed my password to a hacker.

Description : Recommended Mac OS virus scanner/antivirus?

Last Answer : answer:It's Unix based, just don't use a root account. This way if you download anything it would require root access to access system files, and obviously you wouldn't use your root password on ... that it comes with the Mac OS Server), worth checking out. http://en.wikipedia.org/wiki/Clam_AV

Description : I have a virus and I know the exact file it is from, but my pc will not allow me to delete it because it is "being used by another program" how do I get rid of this? My antivirus is doing nothing.

Last Answer : Fdisk it

Description : McAfee is an example of a) Photo Editing Software b) Quick Heal c) Virus d) Antivirus

Last Answer : d) Antivirus

Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus

Last Answer : d) Computer Virus

Description : Code red is a(n)__________ i) Word Processing Software ii) Antivirus iii) Virus iv) Photo Editing Software

Last Answer : iii) Virus

Description : . …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software. A) Stealth virus B) Polymorphic Virus C) Parasitic Virus D) Macro Virus

Last Answer : A) Stealth virus

Description : _____changes each time it is installed to avoid detection by antivirus software. (1) Polymorphic virus (2) worm (3) logic bomb (4) trojan horse

Last Answer : Polymorphic virus

Description : Which is worse? Behaving badly sexually, or behaving badly racially?

Last Answer : There are degrees of everything. In the examples you gave, sexual assault is worse than someone wearing black face, assuming they don’t also assault someone.

Description : How is your weather behaving?

Last Answer : Kinda mild for fall. It was a bit chilly today, though. Maybe 50s.

Description : My computer is behaving paradoxically?

Last Answer : Just so this doesn’t become an orphan, is the problem just with the touch pad? If you attach a mouse does that work?

Description : A way of thinking, behaving or doing something that has been used by the people in a particular group, family, society, etc., for a long time?

Last Answer : Tradition

Description : Rama, a bright pupil, is openly impatient of the errors and slowness of other students in the class and wishes to answer much more than his share of questions. His teacher should Options: A) Ask ... D) Make him realize that he is not so smart by asking him difficult questions that he cannot answer

Last Answer : D) Make him realize that he is not so smart by asking him difficult questions that he cannot answer 

Description : Machine language sometimes referred to as (a) programming language that is used widely by the programmer. (b) machine code or object code -Technology

Last Answer : (b) Machine language sometimes referred to as machine code or object code because it is the language which is only understood by the computer as a computer itself is just a machine or an electronic device.

Description : Programs that ask servers for services are called (a) users (b) hosts -Technology

Last Answer : (c) In the client-server model, the client is a piece of hardware/software that ask servers for services.

Description : ………. is a computer program that provides services to other computer programs. -Technology

Last Answer : Server is a computer program that provides services to other computer programs.

Description : The set of programs designed to perform user specific tasks is called application software. -Technology

Last Answer : TrueApplication software refers to the programs that perform operations for a specified task of a user.

Description : For what, Memo data type is used? (a) To add table (b) To store objects created in other programs -Technology

Last Answer : (c) As we know, Memo provides character upto 65536 so, it is used for long text entries.

Description : ………… is a program that mediates between application programs and hardware. -Technology

Last Answer : Operating systemis a program that mediates between application programs and hardware.

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : What are the some important programs of Accessories? -Technology

Last Answer : Some important programs of Accessories are as follows:1. Calculator It offers advanced capabilities of a programming, scientific and statistical calculator.2. Text Editor It refers to a simple Word processor ... that is used to create drawings on a blank drawing area or in an existing pictures.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Icons represent graphical representation of various files and programs of an operating system.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Recycle Binrepresent graphical representation of various files and programs of an operating system.

Description : ………….. are desktop icons that links to particular files and programs. -Technology

Last Answer : Shortcutsare desktop icons that links to particular files and programs.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.