Give three guidelines to prevent the virus attack. -Technology

1 Answer

Answer :

Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click everything in your mailbox. If you get an unexpected file attachment, send an inquiry E-mail to its sender. Ask him about the nature and function of the file attachment.2. In stable reliable antivirus, scanning software and download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Related questions

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : A ………… confirms to all the XML guidelines. -Technology

Last Answer : well-formed document

Description : List the guidelines to avoid plagiarism. -Technology

Last Answer : Follow the below given guidelines to avoid plagiarism:1. To avoid plagiarism, instead of copying the language of the book as it is, try to put it in your own language/words.2. One should have a ... to credit the author has write which was useful for your task and not taking credit for it yourself.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Explain denial of service attack. -Technology

Last Answer : A denial of service attack is a type of attack that consumes all the resources of a computer.

Description : ………. attack eats up all the resources of a system and halts it. -Technology

Last Answer : Denial of serviceattack eats up all the resources of a system and halts it.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which of the following is not the source of virus? -Technology

Last Answer : Typing through key boardis not the source of virus.

Description : This part of utility software is used to prevent phosphor burning on computer monitors by blanking the screen with moving images. -Technology

Last Answer : (d) Screensavers fill the computer screen with moving images or patterns, when the computer is not in use.

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : What are the various measures that should be taken to prevent spyware from overtaking your system? -Technology

Last Answer : Preventions of SpywareDue to the seriousness of spyware and the harm, it can affect your system and personal information, it is highly recommended you to take the given measures to prevent ... and are capable of blocking suspicious traffic, which can prevent spyware from infecting your system.

Description : Which conventions, prevent window dressing. a. Conservation b. Full disclosure c. Consistency d. Materiality -Technology

Last Answer : Full Disclosure

Description : To prevent unauthorized access to and / or from the network, a system known as ......., can be implemented -Technology

Last Answer : To prevent unauthorized access to and / or from the network, a system known as Firewall, can be implemented by hardware and / or software.

Description : If we somehow mix the genes of a corona-immune creature and a phage and make it attack a virus instead of a bacteria then it sall be a cure won't it please tell me if there is any hole in my plan.-Nithesh.K?

Last Answer : *shall and no question mark at the end..

Description : The cause of Heart attack is: (1) bacteria (2) virus (3) lack of blood supply to the heart (4) impairment of heart's working due to unknown reason

Last Answer : (3) lack of blood supply to the heart Explanation: Heart attack is the death of a segment of heart muscle caused by the loss of blood supply. It occurs when the blood flow that brings oxygen ... artery, one that supplies blood to the heart muscle, is blocked by a blood clot (coronary thrombosis).

Description : What floods a website with so many requests for service that it slows down or crashes? a. Computer virus b. worm c Denial-of-service attack d. None of the above

Last Answer : d. None of the above

Description : Which of the following can a virus do? a. Hurt your hardware b. Hurt any files they weren't designed to attack c. Infect files on write‐protected disks d. None of the above

Last Answer : d. None of the above

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : What floods a Web site with so many requests for service that it slows down or crashes? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : c. Denial‐of‐service attack

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : The cause of Heart attack is: (1) bacteria (2) virus (3) lack of blood supply to the heart (4) impairment of heart’s working due to unknown reason

Last Answer :  lack of blood supply to the heart

Description : As per WHO guidelines, treatment of failure or relapse (category II) patients of smear positive pulmonary tuberculosis differs from that of new cases in the following respect(s): A. All 5 first line antitubercular drugs ... are given in the continuation phase instead of two (HR) D. Both 'A' and 'C'

Last Answer : D. Both 'A' and 'C'

Description : Can you give examples of where voluntary guidelines/regulations for business have actually worked in the real world?

Last Answer : what a lonely question this is going to be. The closest I can come are the programs where companies adopt a section of highway to keep trash and litter free. And another, I suppose would participation in community blood drives.

Description : Research participants must give what before they can participate in a study? a. Guidelines b. A commitment c. Informed consent d. Private information

Last Answer : c. Informed consent

Description : Is it possible to prevent or avoid heart attack, after you notice the symptoms of it?

Last Answer : You could try taking 1 baby aspirin per day (or at the onslaught of heart attack symptoms) if you’re not already taking a blood thinner.

Description : What are the best ways to prevent a cold air triggered asthma attack when outside during the winter?

Last Answer : Breathe in through your nose – Your nose is designed to warm and humidify air. Wear a scarf that covers both nose and mouth. Use your reliever inhaler about 15 minutes before going out into the cold air.

Description : What is the best way to prevent another heart attack?

Last Answer : I don’t have any advice to offer, but I do offer my sympathies and best wishes. Hope it all turns out well.

Description : How to prevent insect attack on him in the book ?

Last Answer : Answer : It is better to keep the bookshelf covered with glass or wooden planks ..... Bookshelves and books should be cleaned at least once in two weeks .. Naphthalene powder should be kept in the corners ... The termites come back on the cut shelf ... or shift the shelf to another good place ..

Description : Assertion:- `SF_(6)` cannot be hydrolysed but `SF_(4)` can be. Reason:- Six F atoms in `SF_(6)` prevent the attack of `H_(2)O` on sulphur atom of `SF_

Last Answer : Assertion:- `SF_(6)` cannot be hydrolysed but `SF_(4)` can be. Reason:- Six F atoms in ` ... D. Statement-I is not correct and Statement-II is correct

Description : What is malware and how to prevent a malware attack?

Last Answer : What is malware?Malicious software is abbreviated as malware. A malware is the most irritating and devastating computer program that intends to either gain access to your device to damage it or ... not open any unsolicited email attachments or embedded links.Keep and use a secured network system.

Description : What is meant by a SQL injection attack? How can you prevent them from occurring in your application? 

Last Answer : SQL injection attacks occur when a malicious user attempts to execute SQL code by passing a SQL string to the application through user input. You can guard against SQL injection attacks by validating the format of all strings derived from user input that are used to form ad hoc SQL statements.

Description : The purpose of controlling the furnace atmosphere is to prevent surface attack by (A) Oxidation/scaling (B) Decarburising (C) Sulphur penetration (D) Either of the above

Last Answer : (D) Either of the above