A …….. is a virus that is often disguised as a useful computer program. -Technology

1 Answer

Answer :

(a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Related questions

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : I am never right. I am often mistaken for being true. I am deceptive and many people use me as an enemy disguised as a friend. What am I? -Riddles

Last Answer : A lie.

Description : What author wrote a popular play that is often considered a disguised criticisim of englands imperalist activities?

Last Answer : Feel Free to Answer

Description : Which written work is often read as a disguised criticism of England's imperialist activities?

Last Answer : the tempest

Description : computer is used to type documents, send E_mail and browse the Internet. It is very useful to us. (i) What are the basic parts of a computer? -Technology

Last Answer : (i) Hardware, software, data and information.(ii) Accuracy, speed, diligence and reliability.

Description : Software is not only the basic requirement of a computer system, it makes a computer more powerful and useful. -Technology

Last Answer : 1. Software is a set of programs that tells the computer to perform a task.2. Computer system divides software into two major categories:(a) System software(b) Application software

Description : The at first glance will appear to be useful software but will actually do damage once installed or run on your computer. -Technology

Last Answer : (c) The Trojans are unauthorized programs placed inside a legitimate application.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : A is someone who breaks into someone else’s computer system, often on a network; -Technology

Last Answer : (a) A hacker is a person who enjoys learning programming languages and about computer systems and their working.

Description : Where can a comment be placed in an HTML document? How is it useful? -Technology

Last Answer : Comments are inserted in HTML code with the help of tag. To insert the text as a comment, type the text between tag, then that text will be ignored by the browser and invisible for the user.e.g.This is a book

Description : Data by itself is not useful unless (a) it is massive (b) it is processed to obtain information -Technology

Last Answer : (b) Data is unprocessed and raw facts. It is not useful unless it is processed to obtain information

Description : Kirti wants to add sound to slide transition. Which feature of Animations tab is useful for this purpose? -Technology

Last Answer : On the Animations tab in the Transition to This Slide group, click the arrow next to ‘Transition Sound’ to add sound to slide transition.

Description : How are Header and Footer useful? -Technology

Last Answer : Header and Footer are very useful for displaying the similar useful information on each slide. One can change the Header and Footer details at any time in the presentation.

Description : Which of the following view is useful for representing the structure of a presentation? -Technology

Last Answer : (b) Outline view is useful for checking the flow or structure of a presentation

Description : For what purpose pie charts are useful? -Technology

Last Answer : Pie charts are useful for the following purposes:1. They convey approximate propositional relationship at a point in time.2. They compare part of a whole at a given point in time.3. Exploded portion of a pie chart emphasizes a small proportion of parts.

Description : ………. is a computer program that provides services to other computer programs. -Technology

Last Answer : Server is a computer program that provides services to other computer programs.

Description : …………. is a program interface that enables a user to communicate with computer through graphics or symbols. -Technology

Last Answer : GUI (Graphical User Interface) is a program interface that enables a user to communicate with computer through graphics or symbols.

Description : A ……. is a software program that is designed to copy itself from one computer to another, without human intervention. -Technology

Last Answer : (c) A worm is a self-replicating software program. It does not require another program to host it.

Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology

Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.

Description : ……….. is a software program that is designed to copy itself from one computer to another. -Technology

Last Answer : Worm is a software program that is designed to copy itself from one computer to another.

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Which of the following is not the source of virus? -Technology

Last Answer : Typing through key boardis not the source of virus.

Description : Would you use a product that so disguised odors that you didn't even know they were there?

Last Answer : answer:No way. What Febreeze doesn’t want you to know is that it is the first and most potent hoarding trigger. no dr zasio for me

Description : [Fiction question] Can you help me think of a really bitchy remark? It has to be an insult disguised as a compliment.

Last Answer : “Wow, this is really nice for maid’s quarters!”

Description : If we were to organize a ask-public Fancy Dress party, what/who would you come disguised as?

Last Answer : Roller Girl, only because I have found some kick ass, old school skates (from my childhood- that still fit!) and knee highs that I have been dying to wear! Not much of a disguise though…..

Description : How many aliens are currently living on Earth, disguised as human?

Last Answer : 42

Description : Are there disguised CIA homeless people in Washington, D.C.?

Last Answer : I mean it wouldn't shock me, but it seems a bit of a massive waste of resources for such little gain. I could see doing that if you knew someone you wanted to watch was in that area . but ... of money/man hours (and highly trained/limited man hours too) to just flood the streets of DC with people.

Description : 11. Distinguish between open unemployment and disguised unemployment. -Class 10th

Last Answer : Open unemployment is when a person is willing to work, is educated but is unable to get a job and work. This kind of unemployment is visible. On the other hand, disguised ... where people working in farms consider themselves employed but are actually working less than their potential.

Description : 10. What do you understand by disguised unemployment? Explain with an example each from the urban and rural areas. -Economics 10th

Last Answer : The situation of underemployment, where people are apparently working but all of them are made to work less than their potential is called disguised unemployment. In this case, the person considers himself ... are unable to find work on a daily basis and work way less than their potential.

Description : What is disguised unemployment ? Explain -SST 10th

Last Answer : (i) It is a situation in which more workers are working in an activity than required. The people who are actually engaged in such an activity appear to be employed, but are ... iv) This type of unemployment can also be called underemployment because workers perform below their productivity level.

Description : Distinguish between open unemployment and disguised unemployment -SST 10th

Last Answer : Open Unemployment Disguised unemployment (i) Open employment refers to the situation in which an individual has no job and unable to earn his livelihood. (i) Disguised unemployment refers to the situation in ... more than requirement of people are working so if they leave that's not a big deal.