What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

1 Answer

Answer :

Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Related questions

Description : ……… is a computer program that detects, prevents and takes action to remove malicious software programs. -Technology

Last Answer : Antivirus is a computer program that detects, prevents and takes action to remove malicious software programs.

Description : Fill in the blanks (i) Viruses, worms and trojans are collectively named ________________. -Technology

Last Answer : (i) Malware(ii) (iii) Web browser(iv) Website(v) (vi) Worm(vii) href(viii) Spyware(ix) Quotes(x) Trojan Horse

Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which among the following are Malicious Softwares: a) Virus and Worms b) Trojan Horse and Time Bomb c) Logic Bomb and Rabbit and Bacterium d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which one is a client level threat? a. Malicious code b. Viruses c. Active contents d. All the above

Last Answer : d. All the above

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : The programmers who break into secure systems for malicious purpose are -Technology

Last Answer : (a) Crackers are the programmers that break into secure systems for malicious purpose.

Description : A malicious program that is used to remove all information from your computer is known as ……… -Technology

Last Answer : A malicious program that is used to remove all information from your computer is known asthe sweeper.

Description : ……… is a program that appears harmless but actually performs malicious functions. -Technology

Last Answer : Trojan horse is a program that appears harmless but actually performs malicious functions.

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : Why do malware writers create malicious programs?

Last Answer : Exactly as you stated: “to make other people’s lives difficult”. They get their own type of self-fulfillment out of it.

Description : _____are computer programs developed to harm and disrupt computers: a) Malicious b) Stanford c) Stipulated d) None of These

Last Answer : a) Malicious

Description : what should i do if my mobile carrier nokia does not helps me deactivating the service of my lost mobile?

Last Answer : answer:Nokia is a manufacturer of phones, not a cell carrier. In the USA the largest cell carriers are Verizon, AT&T, and Sprint. Are you contacting the correct company? Or is the problem that it belonged to your ... answers? We were able to get my ex-bf's phone back after he lost it by doing that.

Description : Can I sue my mobile company if they do not help in deactivating my lost mobile even if my network service provider had cancelled its service?

Last Answer : answer:You can sue anyone, at any time, for any reason. Unless you can show that the phone manufacturer has the ability to deactivate your phone and the responsibility to do so, though, you' ... are you concerned with what the phone manufacturer does? What do you expect the phone manufacturer to do?

Description : What circuit is responsible in activating and deactivating adjacent antenna elements in a mobile satellite array? A. Radial divider B. Divider/combiner C. Radial combiner D. Radial multiplexer

Last Answer : A. Radial divider

Description : Which of the following substituents is an ortho and para director and ring deactivating? (a) –NH2 (b) –Cl (c) –OCH3 (d) –OH

Last Answer : –Cl

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : When a researcher do not possess the quality of collection of the facts from social environment, such research will Options: A) not be a pure research B) be a malicious research C) be a irrelevant research D) pure research 

Last Answer : A) not be a pure research

Description : Give some examples of computer worms. -Technology

Last Answer : MS-Blaster, Mellisa worm, SQL Slammer worm are the common examples of worms.

Description : Which software do you use to keep your system intact from computer viruses? -Technology

Last Answer : Antivirus software is used to keep your system intact from computer viruses.

Description : A safe way to remove viruses is to run an ……… -Technology

Last Answer : A safe way to remove viruses is to run anantivirus software

Description : List the different types of computer viruses. -Technology

Last Answer : 1. File system viruses2. Boot sector viruses3. Macro viruses

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : how prevent ants,fat white worms in compost bin? good or bad,best way get rid of them

Last Answer : ants can't digest cornmeal............for the worms...you could add lime and turn it in.........

Description : Retroviruses are so-named because their reverse transcriptase _____. a. reverses the flow of genetic information by stimulating information to proceed from RNA to DNA. b. reverses the normal ... the action of drugs on viruses and allows them to continue multiplying in living cells.

Last Answer : a. reverses the flow of genetic information by stimulating information to proceed from RNA to DNA.

Description : Adherent mucoid alkaline substance covering the inner lining of stomach is to - (1) digest starch (2) act against bacteria (3) prevent the action of pepsin of mucosa (4) prevent viral infection

Last Answer : (3) prevent the action of pepsin of mucosa Explanation: The continuous adherent mucus layer is also a barrier to luminal pepsin, thereby protecting the underlying mucosa from proteolytic ... support surface neutralization of acid and act as a protective physical barrier against luminal pepsin.

Description : Adherent mucoid alkaline substance covering the inner lining of stomach is to : (1) digest starch (2) act against bacteria (3) prevent the action of pepsin of mucosa (4) prevent viral infection

Last Answer : prevent the action of pepsin of mucosa

Description : How to prevent worms in apples

Last Answer : Need Answer

Description : how do I prevent worms in my apples?

Last Answer : You can spray in the late fall for coddling moth-they form the worms in your apples. If you don't like to spray you can bag each apple individually, tie the bags with a rubber band and when your ... . Or you can leave the apples alone and pick them when they are ripe and cut out the worms.

Description : does using seven dust when planting corn help prevent worms?

Last Answer : There are probably some better alternatives to using sevin dust as it is a pesticide and can cause problems for humans. It will also kill many good insects as well as the harmful ones. If you ... mineral oil as an alternative might be a good idea. Otherwise you can cut off the infected areas.

Description : Programs that ask servers for services are called (a) users (b) hosts -Technology

Last Answer : (c) In the client-server model, the client is a piece of hardware/software that ask servers for services.

Description : ………. is a computer program that provides services to other computer programs. -Technology

Last Answer : Server is a computer program that provides services to other computer programs.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : The set of programs designed to perform user specific tasks is called application software. -Technology

Last Answer : TrueApplication software refers to the programs that perform operations for a specified task of a user.

Description : For what, Memo data type is used? (a) To add table (b) To store objects created in other programs -Technology

Last Answer : (c) As we know, Memo provides character upto 65536 so, it is used for long text entries.

Description : ………… is a program that mediates between application programs and hardware. -Technology

Last Answer : Operating systemis a program that mediates between application programs and hardware.

Description : The time_sharing operating system allows multiple programs share the computer resources simultaneously. -Technology

Last Answer : TrueIn time-sharing OS, a small amount of time is allocated for the processing simultaneously.

Description : What are the some important programs of Accessories? -Technology

Last Answer : Some important programs of Accessories are as follows:1. Calculator It offers advanced capabilities of a programming, scientific and statistical calculator.2. Text Editor It refers to a simple Word processor ... that is used to create drawings on a blank drawing area or in an existing pictures.

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Icons represent graphical representation of various files and programs of an operating system.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Recycle Binrepresent graphical representation of various files and programs of an operating system.

Description : ………….. are desktop icons that links to particular files and programs. -Technology

Last Answer : Shortcutsare desktop icons that links to particular files and programs.

Description : List some commonly available antivirus programs. -Technology

Last Answer : Some of the commonly available antivirus programs in the market are as follows:1. Symantec Norton antivirus2. AVG antivirus3. McAfee scan4. Quick Heal

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : Are there computer viruses that prevent you from going to certain sites?

Last Answer : Nevermind. Now I can reach the sites. Maybe there was a problem with my Internet provider.

Description : Which of the following viruses has a vaccine to prevent it? a. HPV b. HIV c. fifths disease d. herpes simplex I

Last Answer : a. HPV

Description : Can android phones get viruses?

Last Answer : There is an anti-virus you can get free for Android,I have it on my Android tablet,and a friend with an Android phone told me about it. Look for it in the Android store.

Description : Diethyl carbamazine citrate has the following action in filariasis: A. Rapidly kills adult filarial worms and stops production of microfilariae B. Kills circulating microfilariae C. Kills microfilariae present in nodules and serous fluids D. Promotes phagocytosis of circulating microfilariae

Last Answer : D. Promotes phagocytosis of circulating microfilaria

Description : Can you identify examples of refugees utilizing technology to maintain contact with the homeland?

Last Answer : answer:@JonnyCeltics you do realize the vast majority of refugees do not have electricity, basic food and water and therefore little or no access to social networking, right? Those speaking ... (Facebook included) after last years quake/tsunami and the resulting nuclear meltdown in northern Honshu.