Write minimum three ways by which a virus can spread to other systems. -Technology

1 Answer

Answer :

Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Related questions

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : Network formed between computers which is spread across the continents is called (a) LAN (b) WAN -Technology

Last Answer : (b) Across the continents, computers can be connected using WAN only.

Description : Describe any three ways in which Multinational Corporations (MNCs) have spread their production and interaction with local producers in other countries. -SST 10th

Last Answer : Multinational Corporations (MNCs) set up their factories or production units close to markets where they can get desired type of skilled or unskilled labour at low costs along with other factors ... for small producers and sell their products under their own brand name to the customers worldwide.

Description : What are the different ways in which you can start creating a new presentation? Write steps for each. -Technology

Last Answer : Creating New Presentation:For creating a new presentation in MS-PowerPoint, there are two options available to make a selection of creating new presentation:1. Creating Blank PresentationFor creating a blank presentation, ... name box, enter a new name to save the file.3. Then, click Save button

Description : Ms Samtha has many electronics gadgets which are not usable due to outdated hardware and software. Help her to find any three best ways -Technology

Last Answer : 1. Give Your Electronic Waste to a Certified E-Waste Recycler2. Donating Your Outdated Technology3. Give Back to Your Electronic Companies and Drop Off Points.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which of the following is not the source of virus? -Technology

Last Answer : Typing through key boardis not the source of virus.

Description : With which virus does 'swine flu' disease spread? -General Knowledge

Last Answer : Swine Influenza (swine flu) is a respiratory disease of pigs caused by type A influenza virus that regularly causes outbreaks of influenza in pigs. Swine flu viruses do not usually infect humans, but rare human infections have occurred. Symptoms: Cough; Fever

Description : Hepatitis B virus spread ?

Last Answer : This disease can spread in two ways. Hepatitis B infection Hepatitis B can be spread through saliva. The disease is usually spread by contact with liquids and skin. It can be transmitted through blood ... 20%. It spreads rapidly from one member of the family to another. It is not easily detected.

Description : How does the virus spread ?

Last Answer : A few years ago, researchers found out about the origin of all these viruses And that is , bats. February 6, 2003 A mysterious epidemic has spread to many countries in Asia The ... insects However, vaccinating these animals can prevent the spread of the virus and protect humans from infection.

Description : What causes the Corona virus to spread?

Last Answer : I think the simple answer is us humans. The virus does not spread, we spread it by engaging, going out, being reckless. Let's be careful and stay at home stay safe. Thank you ~Berryblue ~

Description : How does Corona Virus Spread?

Last Answer : Simple.... Corona virus spreads on 3 occasions Breathing in air when close to an infected person who is coughing and or sneezing around you which can let out small droplets and particles. Having these small ... a cough or sneeze. Touching eyes, nose, or mouth with hands that have the virus on them.

Description : Can corona virus spread without any visitors having corona virus(sorry bad english still new)?

Last Answer : Yes it can. Because half the people in the united states are not staying qaurentined!!!!!!!!!!

Description : Potato virus diseases are spread by

Last Answer : Ans. Aphids

Description : A _______ is a computer program that can replicate itself and spread from one computer to another. a) Antivirus b) Pen Drive c) Mouse d) Computer Virus

Last Answer : d) Computer Virus

Description : _____was virus first appeared on Friday, March 26, 1999 and spread all over the world faster than any virus seen before: a) 9 Melissa b) 10 Melissa c) 99 Melissa d) None of These

Last Answer : a) 9 Melissa

Description : Virus can spread from one computer to another via use of: a) Infected Floppy Disk b) Computer Networks c) Internet d) All of Above e) None of These

Last Answer : d) All of Above

Description : Which of the following statements is correct? (A) Virus improves the speed of processing information through computer (B) Internet does not allow the virus to spread (C) Virus is a part of software (D) Virus is an operating system

Last Answer : Answer: C

Description : The hard disk is hard to format on different systems. -Technology

Last Answer : FalseHard disk is a secondary storage device which can be formatted on another system using boot sector format option.

Description : Differentiate between hard and soft real_time operating systems. -Technology

Last Answer : Difference between hard and soft real-time OS are as follows:Hard Real-Time OSSoft Real-Time OS1. A hard real-time system guarantees that critical tasks complete on time.1. A soft real-time ... .3. Usually, they are periodic tasks scheduled in background, during the idle time of the processor.

Description : Explain some of the characteristics of modern operating systems. -Technology

Last Answer : Some characteristics of modern operating system are as follows:1. Microkernel ArchitectureProvide a communication facility between the client program and the various services that are also running in ... kernel. Also, it enable programmers to customise an OS without disrupting system integrity.

Description : Real_time operating systems (a) are primarily used on mainframe computers (b) can respond quickly to an event (c) are used for program development -Technology

Last Answer : (b) Real-time operating systems can respond more quickly or predictably to an event than any other OS.

Description : The programmers who break into secure systems for malicious purpose are -Technology

Last Answer : (a) Crackers are the programmers that break into secure systems for malicious purpose.

Description : Purchasing of only one licensed copy of a software and distributing/loading it onto multiple systems is called as ………… -Technology

Last Answer : (a) Softlifting is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement.

Description : The person who responsible for researching, planning and recommending software and systems to meet the requirements of the user/organisation is called -Technology

Last Answer : (b) A system analyst is responsible for researching, planning and recommending software and systems choices to meet an organisation’s business requirements.

Description : What should be the minimum capacity of the RAM for multimedia? (a) 32 MB (b) 64 MB (c) 128 MB (d) 512 MB -Technology

Last Answer : (b) Atleast 64 MB RAM is needed for multimedia.

Description : Do you think about the ways that technology has changed your life?

Last Answer : answer:Positive: I am more informed; I am able to watch TV around my schedule; I can always reach someone if I am out and I need/want something. Negative: I don't remember phone numbers anymore; I spend time ... now, and I am happier now, but whether or not that is due to technology, I can't say.

Description : Pictures can be added to Word documents and they cannot be formatted in various ways. -Technology

Last Answer : FalsePictures can be formatted in various war’s after adding it to the Word document like changing the shape, adding a border, modifying effects, applying a predefined style and more.

Description : After modifying a document using track changes, in how many ways a document can be viewed? -Technology

Last Answer : There are four ways of viewing a document as follows:1. Final Showing Markup2. Final3. Original Showing Markup4. Original

Description : While performing Mail Merge, in how many ways can you select recipients? Explain any one of them. -Technology

Last Answer : When you open or create a data source by using the Mail Merge wizard, you are telling Word to use a specific set of variable information for your merge. Use one of the following methods to attach ... this point, you are also saving the data source and attaching the data source to the main document.

Description : Name two ways where you can create a presentation. -Technology

Last Answer : You can create a presentation under Normal view and Outline view.