List the different types of computer viruses. -Technology

1 Answer

Answer :

1. File system viruses2. Boot sector viruses3. Macro viruses

Related questions

Description : Which software do you use to keep your system intact from computer viruses? -Technology

Last Answer : Antivirus software is used to keep your system intact from computer viruses.

Description : Amit installed an antivirus software to remove all the viruses from his computer. -Technology

Last Answer : 1. Antivirus software is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them.2. Two actions performed by an antivirus ... ) Scanning and monitoring files and folders on your computer to ensure that they are not infected.

Description : A safe way to remove viruses is to run an ……… -Technology

Last Answer : A safe way to remove viruses is to run anantivirus software

Description : What is used to identify, prevent and take action against malicious programs, such as viruses and worms, by deactivating or deleting them? -Technology

Last Answer : Antivirus is used to identify, prevent and take action against malicious programs such as viruses and worms, by deactivating or deleting them.

Description : Fill in the blanks (i) Viruses, worms and trojans are collectively named ________________. -Technology

Last Answer : (i) Malware(ii) (iii) Web browser(iv) Website(v) (vi) Worm(vii) href(viii) Spyware(ix) Quotes(x) Trojan Horse

Description : Below is the list of various types of application softwares: A. Database B. Desktop publishing C. Drawing -Technology

Last Answer : 1. Drawing2. Word processing3. Desktop publishing4. Spreadsheet5. Database

Description : List any two types of alignment that can be applied to a paragraph in HTML. -Technology

Last Answer : Any two types of alignment that can be applied to a paragraph are as follows:Left alignment: This type of alignment aligns text in left. This is the default alignment.Syntax Right alignment: This type of alignment aligns text in right within the paragraph.Syntax

Description : Can android phones get viruses?

Last Answer : There is an anti-virus you can get free for Android,I have it on my Android tablet,and a friend with an Android phone told me about it. Look for it in the Android store.

Description : What are the different forms of list used in HTML? Name any two. -Technology

Last Answer : The different forms of list are ordered list and unordered list.

Description : How are field types Text and Memo different from each other? -Technology

Last Answer : Distinguishing between Text and Memo are as follows:TextMemoIt is used for relatively short entries.It is used for long text paragraphs.It can storeupto255 characters only.It can storeupto65536 characters. ... number of characters.It does not use field size property.e.g. Emp_namee.g. Emp_description

Description : Windows is an operating system that lets you use different types of applications or softwares. -Technology

Last Answer : TrueWindows allows us to use a Word processing application to write a letter. It also lets you to use different types of applications or softwares.

Description : Explain different types of tabs available in MS_Word 2007. -Technology

Last Answer : TabsThese are similar to the menu system of MS-Word 2003. Instead of having drop down menus, MS-Word 2007 creates a Ribbon system, where buttons and commands are grouped under the tabs. Some groups ... to change the outline or draft views, display the ruler or document map, zoom, switch windows etc.

Description : List some benefits of E_learning. -Technology

Last Answer : Some benefits of E-learning are as follows:• It is self-paced.• It can work on any location and anytime.• Online computer-based courses are available.• Reduces travel time and travel cost.

Description : List some advantages and disadvantages of an E_mail. -Technology

Last Answer : Advantages of E-mail are as follows:1. Low cost We can send the E-mail to other person at a very low cost. It requires only Internet connection cost to send the E-mail.2. Speed E-mail ... extra clues of voice, posture and expression, it is easy to understand what someone really means in a message.

Description : Bcc field contains the list of recipients. Bcc stands for (a) Basic carbon copy (b) Blind carbon copy -Technology

Last Answer : (b) Bcc denotes the Blind carbon copy.

Description : What does a create when used in an unordered list? -Technology

Last Answer : creates bulleted points for each list item.

Description : Can you change the style of numbers in an ordered list? -Technology

Last Answer : Yes, we can change the style of numbers in an ordered list.

Description : List any two attributes of tag. -Technology

Last Answer : tag is used to draw horizontal lines in the Web page. This horizontal line divides the screen horizontally. tag creates a shaded horizontal line between text. Attributes of tag are size, align and width.

Description : What is definition list? -Technology

Last Answer : Definition ListThis is a list of items, with a description of each item. HTML definition lists () are an indented list without any bullet symbol or any number in front of each item.These list elements ... term. Definition of the list item. Closing tag that defines the end of the list.

Description : Which of the following tag is used to make a list that lists the items with numbers? -Technology

Last Answer : (c) is the ordered list that starts with a number like 1, A, a, i and I etc.

Description : Which of the following is not HTML list? (a) Ordered (b) Unordered -Technology

Last Answer : (d) Detailed list is not a type of HTML list.

Description : In an unordered list, it is necessary to enclose each item in (a) tag (b) tag -Technology

Last Answer : (a) Each item must be enclosed in tag either in ordered list or unordered list.

Description : Which one of the following list type that will create a bulleted list? (a) Unordered (b) Ordered -Technology

Last Answer : (a) Unordered list provides various types of bullets like the square, disc, and circle.

Description : To start a numbered list with regular numerals, use (a) -Technology

Last Answer : (b) Because regular numbering is the natural numbers starting from 1, 2, 3, … etc.

Description : To create a square bulleted list, use (a) (b) -Technology

Last Answer : (c) Square bulleted list is the part of unordered list.

Description : In an ordered list, each item cannot be preceded with (a) Counting numbers -Technology

Last Answer : (d) In an unordered list, bullets are used while counting numbers, Arabic numbers and Roman numbers are used in an ordered list.

Description : To create a numbered list with A, B, … use (a) -Technology

Last Answer : (a) The given list uses the uppercase letter for each item so, the correct syntax is

Description : To start a list using circles, use (a) (b) -Technology

Last Answer : (d) Because circular list starts with unordered list type circle.

Description : If you want to make a list of items in the form of terms and their descriptions, then you can create a …………. list. -Technology

Last Answer : (c) A definition list is a list of items, with a description of each item.

Description : …………. tag creates a bulleted list. -Technology

Last Answer : tag creates a bulleted list.

Description : The unordered list starts with ………….. tag. -Technology

Last Answer : The unordered list starts with tag.

Description : List some main components of a default window. -Technology

Last Answer : The main components of a default window are as follows:1. Title bar2. Menu bar3. Scroll bar4. Status bar

Description : 1. What is MS_Word 2007? 2. List new features of MS_Word 2007. -Technology

Last Answer : 1. MS-Word 2007 is the Word processing software in the Microsoft 2007 Office suite.2. Some new features of MS-Word 2007 are as follows:(a) The Ribbon System(b) Themes(c) Quick Styles(d) Pictures(e) Live Preview(f) Shapes(g) ClipArt(h) Charts(i) SmartArt

Description : List the components of prolog. -Technology

Last Answer : 1. An XML Declaration2. Processing Instructions (PI)3. Document Type Definition (DTD)4. Comments5. White Spaces and New line

Description : List the important points to create an XML document. -Technology

Last Answer : The points while creating an XML document are as follows:1. XML documents must have starting and closing tags.2. XML tags are case sensitive.3. XML elements must be properly nested.4. XML documents must have one root element.5. The values of XML attributes must be enclosed in double quotes.

Description : List some commonly available antivirus programs. -Technology

Last Answer : Some of the commonly available antivirus programs in the market are as follows:1. Symantec Norton antivirus2. AVG antivirus3. McAfee scan4. Quick Heal

Description : List two advantages of online backup. -Technology

Last Answer : Two advantages of online backup are as follows:1. By having your data stored on a remote hard drive, you run little as there is no risk of losing your data as a result of fire, theft or any other disaster.2. No hardware is needed to maintain or repair the backup.

Description : Complete the blank spaces using words from the list. You should use each word only once. -Technology

Last Answer : 1. PowerPoint2. presentation3. projector4. handouts5. slide6. Websites7. templates

Description : List down some common usage of Information Technology. -Technology

Last Answer : Common usage of IT includes information storage, data processing and statistical analysis, Word processing, accounting and financial forecasting, management information systems, communication, designing ... control and automation of manufacturing processes, computer programmers, computer sales etc.

Description : List the guidelines to avoid plagiarism. -Technology

Last Answer : Follow the below given guidelines to avoid plagiarism:1. To avoid plagiarism, instead of copying the language of the book as it is, try to put it in your own language/words.2. One should have a ... to credit the author has write which was useful for your task and not taking credit for it yourself.

Description : List the various forms of software piracy. -Technology

Last Answer : Software piracy means copying of data or computer software without the owner's permission. However, most peoples are aware about piracy and know that it is illegal, yet the piracy is uncontrollable. This ... is the registered word or text/logo depicting the identity of a product, work or company.

Description : List the advantages of using CSS. -Technology

Last Answer : It controls layout of many documents from one single style sheet.It has more precise control of layout.It applies different layouts to different media-types.It has numerous advanced and sophisticated techniques to be applied on web page

Description : List any 3 items that can be created using DHTML. -Technology

Last Answer : DHTML can be used to create the following:AnimationPop-up menusInclusion of Web page content from external data sourcesElements that can be dragged and dropped within the Web page

Description : Which property is to be used during design time to add a list of countries in the list box? -Technology

Last Answer : Model property

Description : Write the command using Insert() function to add a new column in the last place(3rd place) named “Salary” from the list Sal=[10000,15000,20000] -Technology

Last Answer : EMP.insert(loc=3,column=”Salary”,value=Sal)

Description : Mr. Harry wants to draw a line chart using a list of elements named LIST. -Technology

Last Answer : (i) PLINE.plot(LIST)(ii) PLINE.ylabel(“Sample Numbers”)

Description : Write a python code to create a data frame with appropriate headings from the list given below : -Technology

Last Answer : import pandas as pd# initialize list of listsdata = [['S101', 'Amy', 70], ['S102', 'Bandhi', 69], ['S104','Cathy', 75], ['S105', 'Gundaho', 82]]# Create the pandas DataFramdf = pd.DataFrame(data, columns = ['ID', 'Name', 'Marks'])# printdataframe. print(df )

Description : Write a small python codeto create a dataframewith headings(a and b) from the list given below : [[1,2],[3,4],[5,6],[7,8]] -Technology

Last Answer : import pandas as pddf = pd.DataFrame([[1, 2], [3, 4]], columns = ['a','b'])df2 = pd.DataFrame([[5, 6], [7, 8]], columns = ['a','b'])df = df.append(df2)

Description : List any two differences betweenIncremental model and Spiral model in developing complex software projects. -Technology

Last Answer : Incremental model works on the stage-wise development of a complex project that involves real time data whereas Spiral model works on risk analysis of a real time situation.Spiral model is a combination of both Incremental as well as Waterfall method.

Description : (a) Following is a list of programming languages : BASIC, COBOL, C, JAVA -Technology

Last Answer : (a) JAVA, COBOL(b) jListl. getSelectedValue ( ) ;