Define virus. -Technology

1 Answer

Answer :

A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Related questions

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Name some forms of virus attacks. -Technology

Last Answer : Worms, Trojan horse, Computer Virus etc.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which of the following is not the source of virus? -Technology

Last Answer : Typing through key boardis not the source of virus.

Description : Define a utility software. -Technology

Last Answer : A utility software is a system software designed to help in the management and tuning of operating systems, computer hardwares and different application softwares.

Description : Describe utility software and also define its types. -Technology

Last Answer : It is a system software designed to help in management and tuning of operating systems, computer hardwares and different application softwares.A single piece of utility software is usually called a ... file system which can be mounted by the operating system and treated as an individual drive.

Description : Define the term DBMS. -Technology

Last Answer : The full form of DBMS is a Database Management System. It is a computer based record keeping system.

Description : Define primary key with an example. -Technology

Last Answer : A field which uniquely identifies each record in a table is known as the primary key. e.g. emp id is the primary key of the Employee table.

Description : Define query in the context of database. -Technology

Last Answer : A query is an inquiry into the database using the SELECT statement. These statements give you filtered data according to your conditions and specifications indicating the fields, records, and summaries which a user wants to fetch from a database.

Description : Define forms and what is the need of using them? -Technology

Last Answer : In a database, a form is a window or a screen that contains numerous fields or spaces to enter data. Forms can be used to view and edit your data. It is an interface in the user-specified ... like a paper form. People generally prefer to enter data into a well-designed form, rather than a table.

Description : Define RDBMS. -Technology

Last Answer : RDBMS is a type of DataBase Management System that stores data in the form of relations (tables). Relational databases are powerful, so they require few assumptions about how data is related or how, it will be extracted from the database.

Description : Define database management system. Write two advantages of using database management system for school. -Technology

Last Answer : Database Management System (DBMS) is a collection of programs that enable users to create, maintain database and control all the access to the database. The primary goal of the DBMS is to ... centralized location.2. It provides security to the personal information of the school, stored in it.

Description : Is it necessary to define a field type for a field in MS_Access? -Technology

Last Answer : Yes, it is necessary to define a type of a field while entering data into a field.

Description : Define the term Wi_Fi hotspot. -Technology

Last Answer : A hotspot is a site that offers Internet access over a WLAN via a router connected to a link from an Internet Service Provider (ISP).

Description : Define the AutoNumber data type in MS_ Access. -Technology

Last Answer : AutoNumber data type starts with a number for the first record and it automatically increases the number by a set of amount for each record.

Description : Define primary key. How do you set it in MS_Access? -Technology

Last Answer : Primary key is the key which is used to uniquely identify the records into the table. To set the primary key you have to follow the steps given below:Step 1 Select the field that you want ... 2 Click Primary Key button from the Design tab.orRight click on the selected field and select Primary Key.

Description : When you define a field for a table, which of the following parameters do Access always consider optional? -Technology

Last Answer : (d) Description field of the table is optional, as it depends on the databasedesigner that he/she wants to describe a field or not.

Description : The ………… tag is used to define basic font size for the HTML page. -Technology

Last Answer : Thetag is used to define basic font size for the HTML page.

Description : tag is used to define document body. -Technology

Last Answer : False tag is used to define the document head.

Description : Define height and width attributes of tag. -Technology

Last Answer : The width and height attributes tell the dimension of an image to the browser. Both (height and width) attributes require integer values (dimension of the image in terms of either pixels or percentage of its actual size).

Description : Define various alignments of align attribute with example. -Technology

Last Answer : There are some values of image alignment attribute as follows:Middle AlignmentThis alignment is different in both Internet Explorer and Mozilla Firefox. In Internet Explorer, this alignment aligns the image ... effect reproduction, usually by providing a mechanism for the union of sperm with eggs.

Description : Define the Maximize button. -Technology

Last Answer : The Maximize button in Windows is the middle button with square. It allows the user to enlarge a window, usually making it fills the entire screen.

Description : Define Status bar. -Technology

Last Answer : The bottom line of any window is called Status bar in which an application can display various kinds of status information such as current window’s state, background tasks (such as printing, scanning etc) or other contextual information (such as selection, etc).

Description : Define cellspacing. -Technology

Last Answer : The cellspacing is used to create space between different cells in a table.

Description : Define the and tags. Are these two tags similar? If yes, how? -Technology

Last Answer : tag stands for Table Header. It is used to give headings to the various columns in our table. tag stands for Table Row. It is used to create a row in a table. and tags are not similar. ... . Since, also defines a data cell, which is taken as heading to the columns and the data is boldfaced.

Description : Define MS_Word 2007. -Technology

Last Answer : MS-Word 2007 is a Word processing software package, which allows you to easily create a variety of professional looking documents like letters, reports and other documents using features such as Themes, Styles, SmartArt and more. It is a powerful tool chat you can use to create effective documents.

Description : How will you define an element in DTD contain plain text? -Technology

Last Answer : If an element should contain plain text, you define the element using #PCDATA. PCDATA stands for Parsed Character Data and is the way you specify non-markup text in your DTDs.

Description : Which document is used to define the style of an XML document? -Technology

Last Answer : CSS is a text document (or stylesheet) that is commonly used to define the style and layout of an XML document.

Description : Define prolog and data instance. -Technology

Last Answer : The prolog is a preface or introduction to XML document. It can contain upto five optional components. The grammar structure of the XML document is defined under prolog. The data instance consists of real data and its description through elements. It is also known as body of XML document.

Description : Define CSS. How to create a CSS file? -Technology

Last Answer : CSS is a simple design language intended to simplify the process of making Web pages presentable. CSS is a type of stylesheet and this stylesheet consists of a list of rules. You can include a CSS in multiple XML ... name as well as by code like green color may be written as #008000 or rgb(0,128,0).

Description : Define the term Mail Merge. -Technology

Last Answer : Mail Merge is a useful tool that allows you to produce multiple letters, labels, envelopes by linking a main (common) document to a set of data or data source. The main document is linked to the ... be the letter informing the person that they have won money, or their car service time has arrived.

Description : ……… is used to define the structure of an XML document. -Technology

Last Answer : DTDis used to define the structure of an XML document.