Name some forms of virus attacks. -Technology

1 Answer

Answer :

Worms, Trojan horse, Computer Virus etc.

Related questions

Description : Give the three terms related to the following: 1. Attacks -Technology

Last Answer : 1. Attacks Trojan horse, Worm, Denial of Service.2. Backup Online backup, Full backup, Differential backup.3. Security software Digital signature, Firewall, Antivirus.

Description : Is there a virus that attacks anti-virus program?

Last Answer : Yes, there were such viruses in the past. However, they usually wouled either prevent antivirus from starting, or getting updates, or would uninstall antivirus you have. What you described doesn’t look like a virus attacking your antivirus, though, more like some issue with AVG.

Description : Which of the following is correct regarding AIDS causative agent HIV? (a) HIV is enveloped virus containing one molecule of single-stranded RNA and one molecule of reverse transcriptase. (b) HIV ... ) HIV is unenveloped retrovirus. (d) HIV does not escape but attacks the acquired immune response

Last Answer : (d) HIV does not escape but attacks the acquired immune response.

Description : A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks. A) Worm B) Zombie C) Virus D) Trap doors

Last Answer : B) Zombie

Description : …………….. are used in denial of service attacks, typically against targeted web sites. A) Worm B) Zombie C) Virus D) Trojan horse

Last Answer : B) Zombie

Description : Firewalls are used to protect a communication network system against: (A) Unauthorized attacks (B) Virus attacks (C) Data-driven attacks (D) Fire-attacks

Last Answer : Answer: A In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a ... outside network, such as the Internet, that is assumed to not be secure or trusted.

Description : Virus in a computer is a (1) Chemical that attacks silicon (2) Micro-organism that disturbs integrated circuits (3) Programme that damages the computer software (4) None of the above

Last Answer : Programme that damages the computer software

Description : A computer virus is (1) a chemical that attacks silicon. (2) a micro-organism that destroys integrated circuits. (3) data that the computer fails to handle. (4) a special kind of computer programme.

Last Answer :  a special kind of computer programme.

Description : Utility programs include (a) Virus scanning software (b) Backup software -Technology

Last Answer : (d) Utility programs includes virus scanning, backup, disk defragmenter software.

Description : Define virus. -Technology

Last Answer : A virus is a harmful program, which on entering a computer, starts creating copies of itself. It then attacks by corrupting the executable files and folders saved on the computer.

Description : How does a virus affect your computer? -Technology

Last Answer : A virus is a software used to infect a computer. After virus code is written, it is buried within an essential programmed. Once the programmed is executed, the virus code is activated and attack copies itself to other programs.

Description : Give three guidelines to prevent the virus attack. -Technology

Last Answer : Three guidelines to prevent the virus attack are as follows:1. Avoid the temptation to open unexpected E-mail attachments and downloads from unreliable sources. Resist the urge to double click ... download its updates regularly.3. Scan files downloaded from the Internet or other external sources.

Description : If your computer attacked by a trojan horse virus, what damage it may cause? -Technology

Last Answer : If your computer attacked by a trojan horse virus, it can:1. Steal passwords2. Copy sensitive data3. Carry out any other harmful operations etc.

Description : Write minimum three ways by which a virus can spread to other systems. -Technology

Last Answer : Three ways by which a virus can spread to other systems are as follows:1. When an infected file is copied through the network.2. When a virus file is downloaded from the Internet.3. When an infected file is copied from a floppy disk, USB, DVD etc.

Description : Can firewalls detect virus? -Technology

Last Answer : Firewalls do not screen computer viruses.As the location of firewalls is a good place for scanning, some firewalls have a plug-in virus scanning module.And some programs scan virus at a point either before or after a firewall.

Description : What are the common symptoms of a virus attack? -Technology

Last Answer : Symptoms of Computer Viruses AttackThe list of symptoms of computer viruses attack, which indicate that your system is infected with a computer virus is as follows:1. Odd messages are displaying on ... .10. PC starts performing functions like opening or closing windows, running programs on its own.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : A …….. is a virus that is often disguised as a useful computer program. -Technology

Last Answer : (a) Trojan horse is a virus, i.e. often disguised as a useful computer program.

Description : Which one of the following is not a malware? (a) Computer virus (b) Spam -Technology

Last Answer : (d) Application software refers to the condition in which your computer stops working.

Description : Which of the following is not a symptom of a virus attack? -Technology

Last Answer : (d) Your data is copied to another location is not a symptom of a virus attack.

Description : Which of the following is the first computer virus? (a) Brain -Technology

Last Answer : (c) Elk Cloner is the first computer virus created by Richard Skrenta.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which one of the following is not a way to get a computer virus? (a) Through E_mail attachments -Technology

Last Answer : (c) By typing on the keyboard is not a way to get a computer virus.

Description : One limitation of antivirus programs is that they: (a) Sometimes start behaving like virus -Technology

Last Answer : (d) Antivirus can detect only those viruses for which they are programmed.

Description : ………… is the general term to refer to infectious software such as virus, worm, spyware etc. -Technology

Last Answer : Malware is the general term to refer to infectious software such as a virus, worm, spyware etc.

Description : Unlike a computer virus, a ……….. can replicate itself automatically. -Technology

Last Answer : Unlike a computer virus, a wormcan replicate itself automatically.

Description : A virus may corrupt or delete data on your computer. -Technology

Last Answer : True A virus may corrupt or delete data on your computer.

Description : A virus is a harmful program, which one entering a computer, starts creating copies of itself. -Technology

Last Answer : True Virus is a malicious program that is designed to make a system sick, just like a real virus.

Description : Out of the following, which one will be altered or modified by a computer virus? -Technology

Last Answer : (d) All of the above

Description : Which of the following is not the source of virus? -Technology

Last Answer : Typing through key boardis not the source of virus.

Description : Describe some of the recent forms of advertising. -Technology

Last Answer : Celebrity endorsements can be very popular and build strong associations in the buyers.Merchandise- good, clothes bearing the logo or names or designs of the products are another popular way to ... in promoting products and services. It embeds a product or brand in entertainment and media.

Description : How many forms can E_learning occur? -Technology

Last Answer : E-learning can be CD-ROM based, network based, Intranet or Internet-based.

Description : How many forms can E_learning occur? -Technology

Last Answer : E-learning can be CD-ROM based, network-based, Intranet or Internet-based.

Description : Define forms and what is the need of using them? -Technology

Last Answer : In a database, a form is a window or a screen that contains numerous fields or spaces to enter data. Forms can be used to view and edit your data. It is an interface in the user-specified ... like a paper form. People generally prefer to enter data into a well-designed form, rather than a table.

Description : What are the different forms of list used in HTML? Name any two. -Technology

Last Answer : The different forms of list are ordered list and unordered list.

Description : Letters, numbers and symbols are the various forms of ………….. -Technology

Last Answer : Letters, numbers and symbols are the various forms of data.

Description : Write the full forms of 1. 2. -Technology

Last Answer : 1. Superscript2. Anchor3. Image4. Subscript

Description : Which feature of Word is used to create a set of documents, such as forms or letters etc. (a) Mail Merge -Technology

Last Answer : (a) Mail Merge feature is used to create a set of documents with minor differences like recipient’s name and address.

Description : List the various forms of software piracy. -Technology

Last Answer : Software piracy means copying of data or computer software without the owner's permission. However, most peoples are aware about piracy and know that it is illegal, yet the piracy is uncontrollable. This ... is the registered word or text/logo depicting the identity of a product, work or company.

Description : Discuss the advantages and disadvantages of advertising in different forms of media. -Technology

Last Answer : Student should be able to discuss following five points During the process of Adaptation:i. A new narrative is formed.ii. The new narrative in formed another medium.iii. Script-writer and Director ... context of the original may change.v. The new narrative is an interpretation of the original.

Description : Write the full forms of: (i) URL (ii) (iii) (iv) HTML -Technology

Last Answer : Uniform Resource LocatorList ItemTable DataHyper Text Markup Language

Description : Write the full forms of the following: (i) DDL (ii) DML -Technology

Last Answer : (i) DDL-Data Definition Language(ii) DML-Data Manipulation Language

Description : Write down the full forms of the following: i. URL ii. IDE -Technology

Last Answer : i. Uniform Resource Locatorii. Integrated Development Environment

Description : The following are true : a. the HLA proteins are found within the cytoplasm of the cells b. HLA class I antigens are expressed on all cells with nuclei c. HLA class II antigens presents ... on chromosome 6 e. HLA tissue typing is carried out in all forms of transplantation to prevent rejection

Last Answer : HLA class I antigens are expressed on all cells with nuclei

Description : What's the best anti-virus for best result's on my PC?

Last Answer : answer:Comodo is good, but not great. It is solid enough to keep you mostly safe, but I have yet to see it in any Top picks list. For anti-virus, I favor Avira Free. According to AV ... Avira is consistent). Other sources also place it pretty high, and it earns extra points as it is free.

Description : What are some reliable sources to find out how many Muslims think that the 9/11 attacks were justified?

Last Answer : answer:We would need to know a lot more about the question and its framing, to be able to interpret the answers.For as far as I understand, this answer represents the middle of a ... , while still believing that something like suicide bombs and martyrdom are perfectly OK in their local struggle.

Description : In some individuals the immune system attacks substance such as grass pollen that are usually harmless resulting in?

Last Answer : What is the answer ?

Description : Why do some liberals make vicious personal attacks on Donald Trump Do Ryan J Orr CEO and Co-Founder of Chronicled thinks it really appropriate?

Last Answer : It's no more appropriate than the 8 years of vitriol from thefar right towards Obama.

Description : hi, my dad william zofcin resides at 4730 oakridge dr. north royalton , ohio 44133.. i love my dad , he is 68 yrs old and has ad 2 heart attacks. can u please send some informantion for him on benifits he can receive for anything. medicine?

Last Answer : If he is imilary retired there are prescription benefits and the medicare office will also be more than happy to help you.

Description : Is there a connection between the increase in UFO sightings and the mysterious radio frequency attacks affecting people in DC?

Last Answer : I’ve only heard about this tonight but I’m intrigued.