Home
About Us
Contact Us
Privacy Policy
Search
Home
→
Computer Mcqs
→
What type of virus uses computer hosts to reproduce itself?
Related MCQs
In 1999, the Melissa virus was a widely publicised:__________?
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a__________?
A program that performs a useful task while simultaneously allowing destructive acts is a__________?
Malicious software is known as__________?
Collecting personal information and effectively posing as another individual is known as the crime of__________?
The common name for the crime of stealing passwords is__________?
The typical computer criminal is a(n)__________?
The computer abbreviation KB usually means__________?
Which of the following is not a storage medium?
Large transaction processing systems in automated organisations use__________?
A modem is connected to__________?
Which of the following contains permanent data and gets updated during the processing of transactions?
Which of the following is the smallest storage?
Which of the following does not store data permanently?
Which of the following is not a binary number?
A computer system that is old and perhaps not satisfactory is referred to as a(n)__________?
When a computer is switched on, the booting process performs__________?
Which part of the computer is directly involved in executing the instructions of the computer program?
ASCII is a coding system that provides__________?
The process of transferring files from a computer on the Internet to your computer is called__________?
A DVD is an example of a (n)__________?
To access properties of an object, the mouse technique to use is__________?
A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a__________?
A device that connects to a network without the use of cables is said to be__________?
The most common type of storage devices are_________?
Reusable optical storage will typically have the acronym________?
Why is it unethical to share copyrighted files with your friends?
Codes consisting of lines of varying widths or lengths that are computer-readable are known as__________?
__________are used to identify a user who returns to a Website?
The__________data mining technique derives rules from real-world case examples?
Where does most data go first with in a computer memory hierarchy ?
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called__________?
Computers manipulate data in many ways, and this manipulation is called__________?
Computers process data into information by working exclusively with__________?
When creating a computer program, the__________designs the structure of the program?
__________is the science that attempts to produce machines that display the same type of intelligence that humans do?
The CPU and memory are located on the__________?
All of the following are examples of storage devices EXCEPT__________?
Which of the following is NOT one of the four major data processing functions of a computer?
All of the following are examples of real security and privacy risks EXCEPT__________?
COBOL is an acronym for__________?
A__________is an additional set of commands that the computer displays after you make a selection from the main menu?
Select the Odd one from the following
__________Store data or information temporarily and pass it on as directed by the control unit?
Which one of the following is NOT a computer language?
Magnetic disk is an example of__________?
RAM is an example of__________?
ALU and Control Unit jointly known as__________?
The task of performing operations like arithmetic and logical operations is called__________?
__________provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously?
__________is the ability of a device to “jump” directly to the requested data?
What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Correct Answer:
Worm
✔
Last Updated:
June 08, 2017