Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology
Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.
Description : Fill in the blanks (i) Viruses, worms and trojans are collectively named ________________. -Technology
Last Answer : (i) Malware(ii) (iii) Web browser(iv) Website(v) (vi) Worm(vii) href(viii) Spyware(ix) Quotes(x) Trojan Horse
Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above
Last Answer : e) All of the Above
Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above
Last Answer : d. All the above
Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These
Last Answer : a) Trojan Horses
Description : The programmers who break into secure systems for malicious purpose are -Technology
Last Answer : (a) Crackers are the programmers that break into secure systems for malicious purpose.
Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology
Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.
Description : ……… is a program that appears harmless but actually performs malicious functions. -Technology
Last Answer : Trojan horse is a program that appears harmless but actually performs malicious functions.
Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms
Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity
Description : Why do malware writers create malicious programs?
Last Answer : Exactly as you stated: “to make other people’s lives difficult”. They get their own type of self-fulfillment out of it.
Description : _____are computer programs developed to harm and disrupt computers: a) Malicious b) Stanford c) Stipulated d) None of These
Last Answer : a) Malicious
Description : what should i do if my mobile carrier nokia does not helps me deactivating the service of my lost mobile?
Last Answer : answer:Nokia is a manufacturer of phones, not a cell carrier. In the USA the largest cell carriers are Verizon, AT&T, and Sprint. Are you contacting the correct company? Or is the problem that it belonged to your ... answers? We were able to get my ex-bf's phone back after he lost it by doing that.
Description : Can I sue my mobile company if they do not help in deactivating my lost mobile even if my network service provider had cancelled its service?
Last Answer : answer:You can sue anyone, at any time, for any reason. Unless you can show that the phone manufacturer has the ability to deactivate your phone and the responsibility to do so, though, you' ... are you concerned with what the phone manufacturer does? What do you expect the phone manufacturer to do?
Description : What circuit is responsible in activating and deactivating adjacent antenna elements in a mobile satellite array? A. Radial divider B. Divider/combiner C. Radial combiner D. Radial multiplexer
Last Answer : A. Radial divider
Description : Which of the following substituents is an ortho and para director and ring deactivating? (a) –NH2 (b) –Cl (c) –OCH3 (d) –OH
Last Answer : –Cl
Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network
Last Answer : d. block some hosts from accessing the network
Description : When a researcher do not possess the quality of collection of the facts from social environment, such research will Options: A) not be a pure research B) be a malicious research C) be a irrelevant research D) pure research
Last Answer : A) not be a pure research
Description : Give some examples of computer worms. -Technology
Last Answer : MS-Blaster, Mellisa worm, SQL Slammer worm are the common examples of worms.
Description : Which software do you use to keep your system intact from computer viruses? -Technology
Last Answer : Antivirus software is used to keep your system intact from computer viruses.
Description : A safe way to remove viruses is to run an ……… -Technology
Last Answer : A safe way to remove viruses is to run anantivirus software
Description : List the different types of computer viruses. -Technology
Last Answer : 1. File system viruses2. Boot sector viruses3. Macro viruses
Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology
Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.
Description : how prevent ants,fat white worms in compost bin? good or bad,best way get rid of them
Last Answer : ants can't digest cornmeal............for the worms...you could add lime and turn it in.........
Description : Retroviruses are so-named because their reverse transcriptase _____. a. reverses the flow of genetic information by stimulating information to proceed from RNA to DNA. b. reverses the normal ... the action of drugs on viruses and allows them to continue multiplying in living cells.
Last Answer : a. reverses the flow of genetic information by stimulating information to proceed from RNA to DNA.
Description : Adherent mucoid alkaline substance covering the inner lining of stomach is to - (1) digest starch (2) act against bacteria (3) prevent the action of pepsin of mucosa (4) prevent viral infection
Last Answer : (3) prevent the action of pepsin of mucosa Explanation: The continuous adherent mucus layer is also a barrier to luminal pepsin, thereby protecting the underlying mucosa from proteolytic ... support surface neutralization of acid and act as a protective physical barrier against luminal pepsin.
Description : Adherent mucoid alkaline substance covering the inner lining of stomach is to : (1) digest starch (2) act against bacteria (3) prevent the action of pepsin of mucosa (4) prevent viral infection
Last Answer : prevent the action of pepsin of mucosa
Description : How to prevent worms in apples
Last Answer : Need Answer
Description : how do I prevent worms in my apples?
Last Answer : You can spray in the late fall for coddling moth-they form the worms in your apples. If you don't like to spray you can bag each apple individually, tie the bags with a rubber band and when your ... . Or you can leave the apples alone and pick them when they are ripe and cut out the worms.
Description : does using seven dust when planting corn help prevent worms?
Last Answer : There are probably some better alternatives to using sevin dust as it is a pesticide and can cause problems for humans. It will also kill many good insects as well as the harmful ones. If you ... mineral oil as an alternative might be a good idea. Otherwise you can cut off the infected areas.
Description : Programs that ask servers for services are called (a) users (b) hosts -Technology
Last Answer : (c) In the client-server model, the client is a piece of hardware/software that ask servers for services.
Description : ………. is a computer program that provides services to other computer programs. -Technology
Last Answer : Server is a computer program that provides services to other computer programs.
Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology
Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.
Description : The set of programs designed to perform user specific tasks is called application software. -Technology
Last Answer : TrueApplication software refers to the programs that perform operations for a specified task of a user.
Description : For what, Memo data type is used? (a) To add table (b) To store objects created in other programs -Technology
Last Answer : (c) As we know, Memo provides character upto 65536 so, it is used for long text entries.
Description : ………… is a program that mediates between application programs and hardware. -Technology
Last Answer : Operating systemis a program that mediates between application programs and hardware.
Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology
Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.
Description : What are the some important programs of Accessories? -Technology
Last Answer : Some important programs of Accessories are as follows:1. Calculator It offers advanced capabilities of a programming, scientific and statistical calculator.2. Text Editor It refers to a simple Word processor ... that is used to create drawings on a blank drawing area or in an existing pictures.
Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology
Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.
Description : …………. represent graphical representation of various files and programs of an operating system. -Technology
Last Answer : Icons represent graphical representation of various files and programs of an operating system.
Last Answer : Recycle Binrepresent graphical representation of various files and programs of an operating system.
Description : ………….. are desktop icons that links to particular files and programs. -Technology
Last Answer : Shortcutsare desktop icons that links to particular files and programs.
Description : List some commonly available antivirus programs. -Technology
Last Answer : Some of the commonly available antivirus programs in the market are as follows:1. Symantec Norton antivirus2. AVG antivirus3. McAfee scan4. Quick Heal
Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology
Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.
Description : Are there computer viruses that prevent you from going to certain sites?
Last Answer : Nevermind. Now I can reach the sites. Maybe there was a problem with my Internet provider.
Description : Which of the following viruses has a vaccine to prevent it? a. HPV b. HIV c. fifths disease d. herpes simplex I
Last Answer : a. HPV
Description : Can android phones get viruses?
Last Answer : There is an anti-virus you can get free for Android,I have it on my Android tablet,and a friend with an Android phone told me about it. Look for it in the Android store.
Description : Diethyl carbamazine citrate has the following action in filariasis: A. Rapidly kills adult filarial worms and stops production of microfilariae B. Kills circulating microfilariae C. Kills microfilariae present in nodules and serous fluids D. Promotes phagocytosis of circulating microfilariae
Last Answer : D. Promotes phagocytosis of circulating microfilaria
Description : Can you identify examples of refugees utilizing technology to maintain contact with the homeland?
Last Answer : answer:@JonnyCeltics you do realize the vast majority of refugees do not have electricity, basic food and water and therefore little or no access to social networking, right? Those speaking ... (Facebook included) after last years quake/tsunami and the resulting nuclear meltdown in northern Honshu.