Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) What kind of virus self-replicates and resides in your machine’s memory:

A. Shell
B. Trojan Horse
C. Boot Sector
D. Worm

problem 2) Which of the following is not ex of antivirus software:

A. McAfee
B. Norton Antivirus
C. BitDefender
D. None of the above

problem 3) Which of the following is used to update virus engine or application so as to combat viruses:

A. Virus Destroyer
B. Virus List
C. Virus Database Definition
D. Quarantine

problem 4) The ____ is a server used by spammer to route bulk mails:

A. Optical Mark Replay
B. Open Mail Relay
C. Open Mail Replay
D. Open Mark Relay

problem 5) ______ is a combination of hardware and software which protects the internal systems or hosts from outside access:

A. Spam
B. Firewall
C. NAT
D. None of the above

problem 6) The ____ constantly analyses packets travelling inside network:

A. DMZ
B. TPS
C. IDS
D. NAT

problem 7) Which of the following category doesn’t figure in monitoring list of the content advisor:’

A. Language
B. Sex
C. Nudity
D. Brutality

problem 8) ____ are small script based programs which are added to Microsoft Office documents to create mischief rather than sever damage:

A. Macro Virus
B. Boot Sector Virus
C. File Infector
D. Register Virus

problem 9) In order to manipulate and present data, it must abide to some criteria like _________:

A. Secure
B. User Friendly
C. Cost-Effective
D. All of the above

problem 10) Management Information System caters for Consultancy/Project Management, System Development and _____ :

A. System Support
B. Marketing
C. Both of the above
D. None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96075

Have any Question? 


Related Questions in Computer Engineering

1 describe a recursive algorithm for finding the maximum

1. Describe a recursive algorithm for finding the maximum element in an array A of n elements. What is the running time of your algorithm? 2. Draw the recursion trace for the execution of reverseArray(data, 0, 4), on the ...

The truck-assembly division of a large company produces two

The truck-assembly division of a large company produces two different models: the Aztec and the Bronco. Their basic operation consists of separate assembly departments: drive-train, coachwork, Aztec final, and Bronco fin ...

Draw an entity relationship diagram for flapper

Draw an entity relationship diagram for Flapper Dumpling

Assignment topicnbspthere are nearly a dozen core concepts

Assignment Topic: There are nearly a dozen core concepts or principles that SCRUM is founded upon, which are listed in the "SCRUM Orientation" PowerPoint presentation. Choose three or more of those principles. Research e ...

We used the terms passive open and active open in

We used the terms passive open and active open in discussing a connectionoriented communication using TCP. Assume there is a telephone conversation between Alice and Bob. Since a telephone conversation is an example of a ...

Define inflation assume that you live in a simple economy

Define inflation. Assume that you live in a simple economy in which only three goods are produced and traded: fish, fruit, and meat. Suppose that on January 1, 2010, fish sold for $2.50 per pound, meat was $3.00 per poun ...

1 write an areatester program that constructs a rectangle

1. Write an AreaTester program that constructs a Rectangle object and then computes and prints its area. Use the getWidth and getHeight methods. Also print the expected answer. 2. Write a PerimeterTester program that con ...

Compare electric car telsa semi electric hybrid car toyota

Compare electric car Telsa, semi electric (hybrid car) Toyota Prius, and regular fuel efficient cars Toyota Corolla / Honda Civics How long does it take to re charge a Telsa, how long can Telsa travel, where can you rech ...

1 what is the most effective biometric authorization

1. What is the most effective biometric authorization technology? Why do you think this technology is deemed to be most effective by security professionals?

Identifying purposes and characteristics of

Identifying Purposes and Characteristics of Processors Identifying Purposes and Characteristics of Memory How to Disassembling and Reassembling Laptops. How to Installing and Configuring Expansion Cards What are the diff ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen