Which of the following is the first computer virus? (a) Brain -Technology

1 Answer

Answer :

(c) Elk Cloner is the first computer virus created by Richard Skrenta.

Related questions

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Which of the following is not the source of virus? -Technology

Last Answer : Typing through key boardis not the source of virus.

Description : “Multimedia can stimulate the eyes, ears, brain and fingertips of a person.” With respect to the given statement explain the meaning of multimedia. -Technology

Last Answer : Multimedia means any combination of text, audio, images, animation or video used for communicating through messages or information.

Description : Would you will be willing to have brain surgery and implants so that you can interact with your computer by thought?

Last Answer : answer:Not me. Not at first, anyway. I'd let other people prove the techology before I was willing to try it. Of course, it probably would have been tested out the wazoo by the time it made it to market, and ... the problems are solved. I'll do it. And I don't think we're all that far away even now.

Description : Where is Brain Virus Made in Pakistan ?

Last Answer : Brain virus is made in Lahore, Pakistan.

Description : Brain virus is made in which country ?

Last Answer : Brain virus is made in Pakistan.

Description : In what year was the brain virus created ?

Last Answer : Brain virus was created in 1986.

Description : The virus of AIDS affects the growth of (1) Haemoglobin (2) RBCs in blood (3) T cells in blood (4) Grey cells in brain

Last Answer : (3) T cells in blood Explanation: Human immunodeficiency virus (HIV) attacks and kills crucial immune system cells, known as T-helper cells. A T cell, or T lymphocyte, is a type of ... role in cell-mediated immunity. They are called T cells because they mature in the thymus from thymocytes.

Description : The virus of AIDS affects the growth of _________ (1) Haemoglobin (2) RBCs in blood (3) T cells in blood (4) Grey cells in brain

Last Answer : T cells in blood

Description : What's the best anti-virus for best result's on my PC?

Last Answer : answer:Comodo is good, but not great. It is solid enough to keep you mostly safe, but I have yet to see it in any Top picks list. For anti-virus, I favor Avira Free. According to AV ... Avira is consistent). Other sources also place it pretty high, and it earns extra points as it is free.

Description : The first computer mouse was invented by (a) Christopher Sholes (b) C.B. Mirick (c) Douglas Engelbort (d) Russel A Kirsch -Technology

Last Answer : (c) The first computer mouse was invented by Douglas Engelbart at Stanford Research Centre in 1960s.

Description : The first computer screen that appears as soon as you start your system (a) Workbook (b) Icon (c) Desktop (d) Application -Technology

Last Answer : (c) Desktop is the first and main screen area that you see after your Turn ON your computer and Log ON to Windows.

Description : The at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Technology

Last Answer : (c) The Trojans are unauthorized programs placed inside a legitimate application.

Description : Ishan, a trainee in a multinational bank has just got his first official computer with internet facility in his office. -Technology

Last Answer : Malware is a computer software which is specifically designed with malicious intention generally to disrupt, damage, or gain authorized access to a computer system. It can be of various ... of Antivirus software and regular PC scanDo not click on unknown or suspicious linksAvoid pirated software