Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1) What kind of virus self-replicates and resides in your machine’s memory:

A. Shell
B. Trojan Horse
C. Boot Sector
D. Worm

problem 2) Which of the following is not ex of antivirus software:

A. McAfee
B. Norton Antivirus
C. BitDefender
D. None of the above

problem 3) Which of the following is used to update virus engine or application so as to combat viruses:

A. Virus Destroyer
B. Virus List
C. Virus Database Definition
D. Quarantine

problem 4) The ____ is a server used by spammer to route bulk mails:

A. Optical Mark Replay
B. Open Mail Relay
C. Open Mail Replay
D. Open Mark Relay

problem 5) ______ is a combination of hardware and software which protects the internal systems or hosts from outside access:

A. Spam
B. Firewall
D. None of the above

problem 6) The ____ constantly analyses packets travelling inside network:


problem 7) Which of the following category doesn’t figure in monitoring list of the content advisor:’

A. Language
B. Sex
C. Nudity
D. Brutality

problem 8) ____ are small script based programs which are added to Microsoft Office documents to create mischief rather than sever damage:

A. Macro Virus
B. Boot Sector Virus
C. File Infector
D. Register Virus

problem 9) In order to manipulate and present data, it must abide to some criteria like _________:

A. Secure
B. User Friendly
C. Cost-Effective
D. All of the above

problem 10) Management Information System caters for Consultancy/Project Management, System Development and _____ :

A. System Support
B. Marketing
C. Both of the above
D. None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96075

Have any Question? 

Related Questions in Computer Engineering

Find a doctor is a small startup that helps people find a

Find a doctor, is a small startup that helps people find a physician that best meets their needs ( location, insurance accepted). During a slow time for them, tehy have 7 staff embers taking calls from customers. On aver ...

Assume alice the client creates a tcp connection with bob

Assume Alice, the client, creates a TCP connection with Bob, the server. They exchange data and close the connection. Now Alice starts a new connection with Bob by sending a new SYN segment. The server responds with the ...

1 which cache design is better for each of these benchmarks

1. Which cache design is better for each of these benchmarks? Use data to support your conclusion. 2. Shared cache latency increases with the CMP size. Choose the best design if the shared cache latency doubles. Off -chi ...

In the second extension of dla simple we make the

In the second extension of DLA Simple, we make the probability of sticking dependent on the number of neighbors. We accomplished this by multiplying the probability of sticking by the fraction of neighbors that are green ...

Do the same as in exercise 114 but for a hash table of size

Do the same as in Exercise 11.4 but for a hash table of size 2031 that contains 999 keys. Exercise 11.4: Consider a hash table of size 501 that contains 85 keys. (a) What is the load factor? (b) What is the average numbe ...

1 explain why you think your design meets the needs of

1. Explain why you think your design meets the needs of ElectroMyCycle. 2. List the major user communities for your design. 3. List the major data stores and the user communities for each data store. 4. Identify major ne ...

Write a c program that fills random squares of 3 by 3 with

Write a C++ program that fills random squares of 3 by 3, with unique numbers from 1 to 9, and tests if the generated matrix forms a Magic Squares. Your program should loop until  three magic squares  are generated and  p ...

Assume we need to design a selective-repeat sliding-window

Assume we need to design a Selective-Repeat sliding-window protocol for a network in which the bandwidth is 1 Gbps and the average distance between the sender and receiver is 5,000 km. Assume the average packet size is 5 ...

This chapter covered network management whereas the

This chapter covered network management, whereas the previous chapter covered network security. Note that network design tasks are often interwoven, however, and shouldn't be considered discrete just because a book is di ...

Internet technology project executiion ip3project execution

Internet Technology Project Executiion IP3 Project Execution IP3 Unit: Project Execution Deliverable Length: New content of 3-4 pages All sources should be cited both in-text and in References using APA format; with supp ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro