The at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Technology

1 Answer

Answer :

(c) The Trojans are unauthorized programs placed inside a legitimate application.

Related questions

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : If network simulator software is installed in computer to study network without actually being connected, then will this software cause any interference when actual active network is connected?

Last Answer : No the network simulator software will not cause any problems.

Description : Software is not only the basic requirement of a computer system, it makes a computer more powerful and useful. -Technology

Last Answer : 1. Software is a set of programs that tells the computer to perform a task.2. Computer system divides software into two major categories:(a) System software(b) Application software

Description : 1. Which of the following has been found useful in keeping cholesterol level down? 2. Which Directive Principle is based on Gandhian ideology? 3. The tendency of liquid drop to contract and why does ... the largest area of the world? 20. Which was the first scholar, who read Ashokan edicts?

Last Answer : Answer : 1. Garlic 2. Promotion of cottage industries 3. Due to Surface tension 4. 76 years 5. Surkotda 6. 1948 7. Leila Seth 8. Carbohydrates 9. Sideral year10. Kanishka 11. Lok Sabha ... day 15. Harshavardhana 16. Consolidating the economy 17. Sugar 18. Once 19. Pastoral herding 20. James Princep

Description : Point out the correct statement. a) Mashups are an incredibly useful hybrid Web application b)SaaS will eventually replace all locally installed software c) The establishment and proof of identity is a central network function d) All of the mentioned

Last Answer : All of the mentioned

Description : Mr. X has recently installed a new operating system on his computer 1. Describe the main functions of an operating system. -Technology

Last Answer : 1. Monitors the performance of the system, enables software to communicate with hardware and application softwares to be loaded; gives prompts and error reports to the users.2. Antivirus and compression tool.

Description : Suchi has recently installed a new operating system on her computer. 1. Describe the main functions of an operating system. -Technology

Last Answer : 1. Monitors the performance of the system, enables software to communicate with hardware, enables applications, software to be loaded; gives prompts and error reports to the users.2. Command-driven user interface means CUI, by which a user gives instructions via typing command onto the computer.

Description : …………. is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge. -Technology

Last Answer : Spyware is a type of malware that is installed on a user’s computer and collects information about user without their consent and knowledge.

Description : What are two things that are way different on the first glance, but are, in fact, very similar when you think about it?

Last Answer : Me and you. Him and her. This person and that person. A black man and a white man. An Israeli and an Arab. A Clinton voter and a Trump voter.

Description : I can't be bought but can be stolen with a glance, I'm worthless to one but priceless to two. What am I? -Riddles

Last Answer : Love.

Description : I can't be bought, but I can be stolen with a glance. I'm worthless to one, but priceless to two. What am I? -Riddles

Last Answer : Love.

Description : You are not required to have a hard disk to run multimedia software. -Technology

Last Answer : FalseHard disk is required for multimedia software.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : You have just installed a new network card on RHEL 5 server. When the server is booted up, it does not appear to recognize the new card. What steps do you take to diagnose and correct the issue?

Last Answer : Typically this is a driver issue. Check first that the card is visible on the PCI bus with lspci . Check to see if necessary kernel modules are loaded (with lsmod ). If they are not, ... module from HW vendor keep asking to see if the candidate is familiar with the tainted kernel concept.

Description : Do you assume things about people at first glance?

Last Answer : I try to never make snap assumptions/judgements about anyone, BUT..I do notice ones overall posture, expression, presentation and can tell in an instant the basic state of their energy/self esteem.

Description : computer is used to type documents, send E_mail and browse the Internet. It is very useful to us. (i) What are the basic parts of a computer? -Technology

Last Answer : (i) Hardware, software, data and information.(ii) Accuracy, speed, diligence and reliability.

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : When do you glance at the toilet paper holder?

Last Answer : A

Description : Does it frustrate you when you walk into a store or an office, and nobody bothers to at least glance at you to acknowledge that they see you?

Last Answer : Yes, it hacks me off, for sure. They either ignore you or won’t leave you alone. Our Walgreen’s here is good for speaking to you when you walk in the door. The checker always gives you a shout out. It must be company policy to do that, as they all do.

Description : When you just quickly glance at a map, what direction do you assume a river flows?

Last Answer : I always assume south.

Description : Why is a bullet like a tender glance? -Riddles

Last Answer : Because it pierces hearts.

Description : What AMD Ryzen 5 5600X open cover and disassembly exposure: ZEN3 inside a glance?

Last Answer : iBee Parts - Professional Factory Supplier For iPhone Samsung Huawei LCD Screen & Battery Repair Parts Replacement. Despite the loss, the important areas of the chip can be seen clearly and the photographing work can continue.iBee Parts ... P40 Nova 5 6 7Xiaomi 3 4 5 6 7 8 9 10 Redmi Note 4 5 6 7 8

Description : What does it mean at a glance ?

Last Answer : At a glance means at a glance.

Description : Statement-1: Auto reduction of ores is used for cinnabar, copper glance and Galena ores Statement-2:The sulphide ores of these metals react with their

Last Answer : Statement-1: Auto reduction of ores is used for cinnabar, copper glance and Galena ores Statement-2: ... Statement-1 is false but Statement -2 is true

Description : Which three OpenStack components does Nova need to function? a) Neutron, Horizon and Glance b) Glance, Keystone and Horizon c) Keystone, Glance and Neutron d) Cinder, Swift and Kolla

Last Answer : Keystone, Glance and Neutron

Description : Which component serves as a dashboard for users to manage OpenStack compute, storage and networking services? a) Designate b) Horizon c) Glance d) Searchlight

Last Answer : Horizon

Description : A bar chart is commonly used because (a) It is simple to draw and easy to understand (b) It indicates at a glance the overall progress of the project (c) It shows critical ... critical activities (d) It incorporates uncertainties for delay in estimation of time required for completion of activities.

Last Answer : (a) It is simple to draw and easy to understand

Description : ………….. is the background image of display screen on which windows, icons and other graphical items appear. -Technology

Last Answer : Desktopis the background image of display screen on which windows, icons and other graphical items appear.

Description : The …………… alignment makes sure that none of the edges of text appear ragged. (a) left (b) right (c) center (d) justify -Technology

Last Answer : (d) Justify alignment makes sure that none of the edges of text appear ragged.

Description : In XML, value of attribute must appear -Technology

Last Answer : (c) in quotes

Description : DTD is a set of rules that defines what tags appear in an HTML document. -Technology

Last Answer : False DTD is used in XML documents.

Description : Pseudo attributes are the settings that appear in prologs. -Technology

Last Answer : True Pseudo attributes describe the overall document.

Description : When the Edit Individual Documents option is selected, how does each letter appear in the new document created after the merge? -Technology

Last Answer : (b) When the Edit Individual Documents option is selected, separate sections for each letter appear in the new document created after the merge.

Description : Once the SDK update is out, what's the first program you think should be installed on your phone?

Last Answer : I think some sort of flash player would top my list.

Description : Undervoltage trips are frequently installed on switchboard circuit breakers to trip ____________. A. out generators in the event of severe arcing or sparking B. out generators when there is reversal of power ... , but continues to run D. out generators when there is low voltage in the main circuit

Last Answer : Answer: D

Description : Enlist different biological agents which damage paper based library resources. -Technology

Last Answer : The three biological agents that damage paper based library resources are Microorganisms, Insects and Rodents.

Description : I exist, but have no material form. I am made of numbers, but appear square. I build upon other of my own, but do not topple down. I sit still and do nothing, but I'm still useful. What am I? -Riddles

Last Answer : Minecraft Blocks.

Description : So I've gone and installed Ubuntu on the family computer. How does one go about installing Linux software that he finds on the Web?

Last Answer : answer:To get windows software to install you will have to get wine. Its a type of emulator (but not really) that lets you install windows programs and run them through it. As for tar.gz format compression ... to find the software rather than from the site. It'll find it 95% of the time I'd say

Description : Does computer software come pre-installed?

Last Answer : Yes computer software comes pre installed on all new computers. This can include typing programs, media programs, as well as your operating system. Also included couple be games and movies.

Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware

Last Answer : a. Key logger software

Description : ……… is a program that appears harmless but actually performs malicious functions. -Technology

Last Answer : Trojan horse is a program that appears harmless but actually performs malicious functions.

Description : Why does The fungus damages bat wings causing small holes and scar tissue to appear in the membranes. What is a possible effect of this damage to bat wings?

Last Answer : idk maybe because they are stinky

Description : Accidental grounds in a shipboard electrical system must be repaired as soon as possible as they will ____________. A. result in immediate power outages B. damage circuit breakers C. appear on the ground detection system D. damage insulation and may cause outages

Last Answer : Answer: D

Description : Where can a comment be placed in an HTML document? How is it useful? -Technology

Last Answer : Comments are inserted in HTML code with the help of tag. To insert the text as a comment, type the text between tag, then that text will be ignored by the browser and invisible for the user.e.g.This is a book

Description : Data by itself is not useful unless (a) it is massive (b) it is processed to obtain information -Technology

Last Answer : (b) Data is unprocessed and raw facts. It is not useful unless it is processed to obtain information

Description : Kirti wants to add sound to slide transition. Which feature of Animations tab is useful for this purpose? -Technology

Last Answer : On the Animations tab in the Transition to This Slide group, click the arrow next to ‘Transition Sound’ to add sound to slide transition.

Description : How are Header and Footer useful? -Technology

Last Answer : Header and Footer are very useful for displaying the similar useful information on each slide. One can change the Header and Footer details at any time in the presentation.

Description : Which of the following view is useful for representing the structure of a presentation? -Technology

Last Answer : (b) Outline view is useful for checking the flow or structure of a presentation

Description : For what purpose pie charts are useful? -Technology

Last Answer : Pie charts are useful for the following purposes:1. They convey approximate propositional relationship at a point in time.2. They compare part of a whole at a given point in time.3. Exploded portion of a pie chart emphasizes a small proportion of parts.

Description : Installed a new processor. When booting up, it freezes on the bios boot screen. Is this processor DOA? Or what else could my problem be?

Last Answer : What’s your PSU wattage?