Give some examples of computer worms. -Technology

1 Answer

Answer :

MS-Blaster, Mellisa worm, SQL Slammer worm are the common examples of worms.

Related questions

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : Fill in the blanks (i) Viruses, worms and trojans are collectively named ________________. -Technology

Last Answer : (i) Malware(ii) (iii) Web browser(iv) Website(v) (vi) Worm(vii) href(viii) Spyware(ix) Quotes(x) Trojan Horse

Description : What is general purpose application software? Give some examples of general purpose application. -Technology

Last Answer : General purpose application softwares are those softwares, which are used for any general function. They allow people to do simple computer tasks. It is sometimes referred to as GPS. e.g. graphics, multimedia, presentation software, desktop publishing software etc.

Description : Give examples of a container element in HTML. -Technology

Last Answer : , , .

Description : Give the examples of an empty element in HTML. -Technology

Last Answer : The examples of an empty element in HTML is ,

Description : Write examples of segmented worms:?

Last Answer : Bristle worms; Earth worms; Leeches

Description : Mention some examples of utility software. -Technology

Last Answer : Data compression utilities, virus protection utilities and disk defragmentation utilities.

Description : Can you identify examples of refugees utilizing technology to maintain contact with the homeland?

Last Answer : answer:@JonnyCeltics you do realize the vast majority of refugees do not have electricity, basic food and water and therefore little or no access to social networking, right? Those speaking ... (Facebook included) after last years quake/tsunami and the resulting nuclear meltdown in northern Honshu.

Description : Name the types of software with examples for each. -Technology

Last Answer : There are two types of software, i.e. system software and application software. Language processors (interpreters,compilers and assemblers), operating systems etc., are the examples of system software. Whereas, payroll system, accounting software etc., are the examples of an application software.

Description : What is an operating system? Explain its functions with an examples. -Technology

Last Answer : It is a program that acts as an interface between the user and the hardware (i.e. for all computer resources). An operating system is an important component of a computer system, which controls and ... users cannot access the system e.g. MS-DOS, Windows 95, Windows XP, Windows Vista etc.

Description : Explain the difference between data and information alongwith the examples of each. -Technology

Last Answer : Differences between data and information are as follows:DataInformation1.Data is used as input for the computer science.1.Information is the output of data.2.It is unprocessed facts or figures.2.It is ... of the class or the student is the information that can be concluded from the given data.

Description : CPU time, memory space are the examples of system resources. -Technology

Last Answer : TrueSystem resources include many resources such as CPU time, memory space, I/O address, DMA channel to alert the need of hardware and software.

Description : Write the DTD for the following XML document: -Technology

Last Answer : ]>

Description : Briefly explain the two broad categories of a newspaper format giving suitable examples. -Technology

Last Answer : The analysis of newspaper content suggests two broad categories of newspaper formatBroadsheet Press (quality or serious press)…. Explanation with examplesTabloid Press (Popular or sensational press)… Explanation with examples

Description : Why cinema is called the mother of all arts? Elucidate with examples. -Technology

Last Answer : The answer should have a good introduction, body and conclusion. The student can write an answer on the lines of the following-Cinema is a recording medium. When a writer writes a scene, he does ... written form. Thus we are always dealing with a composite language, when we are dealing with cinema.

Description : What do you understand by Market Segmentation? Explain the process with the help of examples. -Technology

Last Answer : Market segmentation - is the process of breaking down a larger market into smaller segments with specific characteristics. It helps to customize a product/ service and also evolve the advertising ... enhanced appearance and feeling rich are some considerations. It applies specially to luxury items.

Description : GIMP, Adobe Photoshop, Corel Draw, and Picasa are examples of _________ softwares. -Technology

Last Answer : GIMP, Adobe Photoshop, Corel Draw, and Picasa are examples ofDesktop Publishing.

Description : Random Access Memory and Read Only Memory are examples of ____________. -Technology

Last Answer : Random Access Memory and Read Only Memory are examples ofPrimary Memory.

Description : Write two examples each of software in the following categories : -Technology

Last Answer : (i) Open Source Operating System-Google Chrome OS, Linux(ii) Open Source Web Browser – Google Chrome, Mozilla Firefox

Description : Write examples of any two properties and any two methods of j Button component -Technology

Last Answer : Two methods of jButton component: getText ( ), setText ( )Two properties of jButton component: Font, Labe

Description : Which of the following is/are threats for electronic payment systems? a) Computer worms b) Computer Virus c) Trojan horse d) All of the above

Last Answer : d) All of the above

Description : Which of the following is/are threats for electronic payment systems? i) Computer worms ii) Computer virus iii) Trojan horse iv) All of the above

Last Answer : iv) All of the above

Description : Which among the following is correct about the Antivirus Programs: a) They contain a database of signatures for all known viruses and worms b) The software searches a computer for the presence of these signatures c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : Do you have any examples of good ideas that were around a long time before being implemented?

Last Answer : answer:Helicopters by Da Vinci took about four hundred years. It needed lightweight power-plant / engine.

Description : Sakshi is preparing a lecture on output device like monitor. Discuss. (i) Give some advantages of the output device ‘monitor’. -Technology

Last Answer : (i) (a) Relatively cheap and reliable.(b) Can display text and graphics in a wide range of colors.(ii) (a) No permanent copy to keep the results as it will disappear when the computer is switched OFF.(b) Unsuitable for users with visual problems.

Description : What are HLLs? Give example of some HLLs. -Technology

Last Answer : It is an advanced computer programming language that is not limited to one computer, designed for a specific job and is easier to understand. The main advantage of high level languages over low level languages is ... are easier to read, write and understand, e.g. BASIC, C, FORTRAN, Java and Pascal.