Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1) What kind of virus self-replicates and resides in your machine’s memory:

A. Shell
B. Trojan Horse
C. Boot Sector
D. Worm

problem 2) Which of the following is not ex of antivirus software:

A. McAfee
B. Norton Antivirus
C. BitDefender
D. None of the above

problem 3) Which of the following is used to update virus engine or application so as to combat viruses:

A. Virus Destroyer
B. Virus List
C. Virus Database Definition
D. Quarantine

problem 4) The ____ is a server used by spammer to route bulk mails:

A. Optical Mark Replay
B. Open Mail Relay
C. Open Mail Replay
D. Open Mark Relay

problem 5) ______ is a combination of hardware and software which protects the internal systems or hosts from outside access:

A. Spam
B. Firewall
C. NAT
D. None of the above

problem 6) The ____ constantly analyses packets travelling inside network:

A. DMZ
B. TPS
C. IDS
D. NAT

problem 7) Which of the following category doesn’t figure in monitoring list of the content advisor:’

A. Language
B. Sex
C. Nudity
D. Brutality

problem 8) ____ are small script based programs which are added to Microsoft Office documents to create mischief rather than sever damage:

A. Macro Virus
B. Boot Sector Virus
C. File Infector
D. Register Virus

problem 9) In order to manipulate and present data, it must abide to some criteria like _________:

A. Secure
B. User Friendly
C. Cost-Effective
D. All of the above

problem 10) Management Information System caters for Consultancy/Project Management, System Development and _____ :

A. System Support
B. Marketing
C. Both of the above
D. None of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96075

Have any Question? 


Related Questions in Computer Engineering

Suppose a user has physical access to computer hardware

Suppose a user has physical access to computer hardware (specifically, the box containing the CPU and a hard drive). The user does not have an account on the computer. How can the user force the computer to shut down? To ...

1 handling forensic evidence in cyber crime situations must

1. Handling forensic evidence in cyber crime situations must be done very carefully. Discuss the many pitfalls that an investigator must be aware of. 2. One of the methods used in extracting computer forensics evidence i ...

1 list and describe five typical goals for a network design

1. List and describe five typical goals for a network design testing project. 2. What are some advantages of using industry tests for your network design testing project? What are some disadvantages of using industry tes ...

Question 1polybius was an ancient greek writer who first

Question 1 Polybius was an ancient Greek writer who first proposed a method of substituting different two-digit numbers for each letter. The alphabet is written inside a 5-by-5 square matrix which has numbered rows and c ...

1 why was vbscript not very popular2 the biggest script

1. Why was VBScript not very popular? 2. The biggest script security threat has always been the acceptance of untrusted data. What is the best way for scripts to accept data and preserve the trust?

1 in what fraction of all cycles is the data memory used2

1. In what fraction of all cycles is the data memory used? 2. In what fraction of all cycles is the input of the sign-extend circuit needed? What is this circuit doing in cycles in which its input is not needed? 3. When ...

Write your own bitarray class without inheriting from the

Write your own BitArray class (without inheriting from the BitArray class) that includes a conversion method that takes Boolean values and converts them to bit values. Hint: use a BitArray as the main data structure of t ...

Discussion questionpersonal factors such as anger revenge

Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate security ...

Q1 what are the three techniques to improve performance of

Q.1 What are the three techniques to improve performance of CPU? Q.2 Describe how a cache memory is organized? Q.3 What are the three different approaches are commonly used to enhance the performance of memory? Q.4 Narra ...

Daisyworld model some abms are used not as models of

Daisyworld model Some ABMs are used not as models of real-world events, but rather as thought experiments. Run the Daisyworld model (found in the Biology section of the NetLogo models library). This model defines a world ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro