Question

A computer virus is a program that inserts itself into one or more files and then...

A computer virus is a program that inserts itself into one or more files and then performs some action. Which of the following situation is not possible? Question 5 options: a virus is executing when the host application is running. a virus is not executing when the host application is not running. a virus is executing when the host application is not running. a virus is never executing when the host application is running.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Question:5-------- A computer virus is a program that inserts itself into one or more files and then performs some action. Which of the following situation is not possible?
a. virus is executing when the host application is running.
b. virus is not executing when the host application is not running.
c. virus is executing when the host application is not running.
d. virus is never executing when the host application is running.

Answer:-----------
d. virus is never executing when the host application is running.

Add a comment
Know the answer?
Add Answer to:
A computer virus is a program that inserts itself into one or more files and then...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 36. What kind of virus runs in place of the computer's normal system files? A. Worms...

    36. What kind of virus runs in place of the computer's normal system files? A. Worms B. Macro viruses C. File-infector viruses D. Boot sector viruses 37. What of the following features does not distinguish an NGFW from traditional firewalls? A. Application Control B. IDS and/or IPS C. User awareness D. UTM (Unified Threat Management) 38. The act of taking advantage of vulnerability is known as which of the following? a. hacker b. poisoning c. snooping d. exploit 39. What...

  • 1. Which of the following commands will locate all of the program files on a computer...

    1. Which of the following commands will locate all of the program files on a computer on which the SUID bit is set? Select one: a. find / -type SUID b. find / -perm +4000 -type f c. find / -perm +SUID -type f d. find / -suid 2. A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs? Select one: a. TCP wrappers refuses to run and logs an error...

  • Need a java program which solves the following problem (COMPUTER PROJECT) Twenty computers are connected in...

    Need a java program which solves the following problem (COMPUTER PROJECT) Twenty computers are connected in a network. One computer be- comes infected with a virus. Every day, this virus spreads from any infected computer to any uninfected computer with probability 0.1. Also, every day, a computer technician takes 5 infected computers at random (or all infected computers, if their number is less than 5) and removes the virus from them. Estimate: (a) the expected time it takes to remove...

  • Part 1: A pipelined computer completes instructions more quickly by having more than one instruction at...

    Part 1: A pipelined computer completes instructions more quickly by having more than one instruction at a time "in the pipeline." Explain what problem branch instructions cause with instruction pipelining. Describe one approach to overcoming this problem. Part 2: RISC computers generally execute more instructions per second than CISC computers. Describe the penalty or trade-off paid when adopting the RISC architecture. Part 3: When a cache hit to a cache on the CPU chip occurs on a memory write the...

  • Write a C# program that allows one user to play Rock-Paper-Scissors with computer. The user will...

    Write a C# program that allows one user to play Rock-Paper-Scissors with computer. The user will pick a move (Rock Paper Scissors) from 3 radio buttons and click the play button to play the game. The application will use random number generator to pick a move for the computer. Then, the application display the computer's move and also display whether you won or lost the game, or the game is tie if both moves are the same. The application must...

  • Write a program using C/C++ to demonstrate the memory leak problem. Execute the program until it cannot proceed anymore. You may have to allocate big chunks of memory iteratively to reach to this poin...

    Write a program using C/C++ to demonstrate the memory leak problem. Execute the program until it cannot proceed anymore. You may have to allocate big chunks of memory iteratively to reach to this point quickly. This is even more so if you are running the program on a 64-bit operating system. Based on your observation and your understanding of the principles of a paging memory management system, answer the following questions: A. How much memory has the program used when...

  • Computer Security Help 21) The process of keeping a backup copy of each file being worked...

    Computer Security Help 21) The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________. A) file backup B) file/folder backup C) image backup D) shadowing 22) Attacks other than application level attacks usually fail to get through SPI firewalls. True False Save 23) Normally, there is no limit on how long shadowing may maintain backed up files. True False 24) Java applets are large Java programs. Question...

  • The questions below deal with Microsoft Visual Studio 2012 Reloaded, under the Visual Basic programming language....

    The questions below deal with Microsoft Visual Studio 2012 Reloaded, under the Visual Basic programming language. The book ISBN number that I am using is: 978-1-285-08416-9 or the UPC code is: 2-901285084168-1. Question 1 Visual Basic 2012 is an object-oriented programming language, which is a language that allows the programmer to use ____________________ to accomplish a program�s goal. Question 2 An application that has a Web user interface and runs on a server is called a(n) ____________________ application. Question 3...

  • Some molecules have more than one chiral carbon. In this case, the molecule itself may or...

    Some molecules have more than one chiral carbon. In this case, the molecule itself may or may not be chiral. Which is true about following molecule? CI CI Difficulty: 3 - Hard Topic: Molecular Structure and Orbitals It is chiral because it has a chiral carbon It is chiral because it has two carbons It is achiral because it is the same as its mirror image It is chiral because its different from its mirror image It is achiral because...

  • Problem (Computer Assisted Instruction) The use of computers in education is referred to as Computer Assisted...

    Problem (Computer Assisted Instruction) The use of computers in education is referred to as Computer Assisted Instruction (CAI). Develop a Java application that can help an elementary school student learn division of two decimal integer numbers. When the application is launched, its behaviour should be like as described: 1. The application should welcome the learner and ask if ready to learn the topic. Assume the application can assist only to learn division of two integer numbers. 2. If the user...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT