Computer Aptitude
COMPUTER VIRUS MCQs
Total Questions : 13
| Page 1 of 2 pages
Answer: Option A. -> data or time
A time bomb is a type of malicious code that is programmed to execute or trigger after a certain amount of time or a specific event. It is a type of logic bomb that relies on a specific date or time to activate.
A logic bomb is a type of malware that is triggered by a specific event or condition, such as a particular date or time, a specific action taken by the user, or the presence or absence of a particular file or program. When the conditions are met, the logic bomb activates and can perform a variety of malicious actions, such as deleting files, stealing data, or disrupting normal system functions.
Therefore, option A, data or time, is the correct answer.
Here are some relevant definitions and formulas related to this topic:
A time bomb is a type of malicious code that is programmed to execute or trigger after a certain amount of time or a specific event. It is a type of logic bomb that relies on a specific date or time to activate.
A logic bomb is a type of malware that is triggered by a specific event or condition, such as a particular date or time, a specific action taken by the user, or the presence or absence of a particular file or program. When the conditions are met, the logic bomb activates and can perform a variety of malicious actions, such as deleting files, stealing data, or disrupting normal system functions.
Therefore, option A, data or time, is the correct answer.
Here are some relevant definitions and formulas related to this topic:
- Time bomb: A type of logic bomb that relies on a specific date or time to activate.
- Logic bomb: A type of malware that is triggered by a specific event or condition.
- Malware: Any software designed to cause harm to a computer system, network, or device.
- Trigger: The specific event or condition that activates the logic bomb.
- Payload: The malicious actions performed by the logic bomb once it is triggered.
- Detection and prevention: Various techniques and tools can be used to detect and prevent logic bombs and other types of malware, including antivirus software, intrusion detection systems, and network security protocols.
Answer: Option E. -> Macro virus
A macro virus is a type of computer virus that is written in the same language as the application software it has infected. Macro viruses are spread through documents, spreadsheets and other software programs, which contain macros, small programs that automate tasks. Macro viruses work by replicating themselves and attaching to application software, such as Microsoft Word or Excel.
Definition:
Macro virus: A macro virus is a type of computer virus that is written in the same language as the application software it has infected.
Key Points:
• Macro viruses are spread through documents, spreadsheets and other software programs, which contain macros, small programs that automate tasks.
• Macro viruses work by replicating themselves and attaching to application software, such as Microsoft Word or Excel.
• Macro viruses are difficult to detect, as they are embedded within the application software.
• Macro viruses can cause a variety of damage to computer systems, from deleting files to corrupting data.
• The only way to prevent macro viruses is to keep the application software updated and install anti-virus software.
A macro virus is a type of computer virus that is written in the same language as the application software it has infected. Macro viruses are spread through documents, spreadsheets and other software programs, which contain macros, small programs that automate tasks. Macro viruses work by replicating themselves and attaching to application software, such as Microsoft Word or Excel.
Definition:
Macro virus: A macro virus is a type of computer virus that is written in the same language as the application software it has infected.
Key Points:
• Macro viruses are spread through documents, spreadsheets and other software programs, which contain macros, small programs that automate tasks.
• Macro viruses work by replicating themselves and attaching to application software, such as Microsoft Word or Excel.
• Macro viruses are difficult to detect, as they are embedded within the application software.
• Macro viruses can cause a variety of damage to computer systems, from deleting files to corrupting data.
• The only way to prevent macro viruses is to keep the application software updated and install anti-virus software.
Answer: Option C. -> bomb
Answer: Option A. -> Command. com
The Le-Hard virus is a computer virus that was first discovered in October 1997. It is also known as "Chaihai" or "CIH" virus. This virus targets the Windows 95/98 operating system and infects the master boot record (MBR) of the hard disk drive. It can overwrite critical system files and can cause severe damage to the system.
Now, let's take a closer look at the given options and determine the correct answer:
A. Command.com: Command.com is a command interpreter for DOS and Windows operating systems. It is responsible for executing many of the internal commands of the operating system. The Le-Hard virus is a file infecting virus that targets Command.com, and when executed, it infects other executable files on the system.
B. FRIDAY 13: FRIDAY 13 is a virus that triggers on Friday the 13th and is not related to the Le-Hard virus.
C. Hardware: The Le-Hard virus is a software virus that infects the software components of a computer system. It does not affect the hardware components of the system.
D. Software: The Le-Hard virus is a software virus that infects the software components of a computer system.
E. None of these: As explained above, the correct answer to the given question is option A, "Command.com".
In conclusion, the Le-Hard virus is a file infecting virus that targets the Command.com interpreter in the Windows 95/98 operating system. When executed, it infects other executable files on the system and can cause severe damage to the system. It is important to have updated antivirus software installed to protect against such viruses.
The Le-Hard virus is a computer virus that was first discovered in October 1997. It is also known as "Chaihai" or "CIH" virus. This virus targets the Windows 95/98 operating system and infects the master boot record (MBR) of the hard disk drive. It can overwrite critical system files and can cause severe damage to the system.
Now, let's take a closer look at the given options and determine the correct answer:
A. Command.com: Command.com is a command interpreter for DOS and Windows operating systems. It is responsible for executing many of the internal commands of the operating system. The Le-Hard virus is a file infecting virus that targets Command.com, and when executed, it infects other executable files on the system.
B. FRIDAY 13: FRIDAY 13 is a virus that triggers on Friday the 13th and is not related to the Le-Hard virus.
C. Hardware: The Le-Hard virus is a software virus that infects the software components of a computer system. It does not affect the hardware components of the system.
D. Software: The Le-Hard virus is a software virus that infects the software components of a computer system.
E. None of these: As explained above, the correct answer to the given question is option A, "Command.com".
In conclusion, the Le-Hard virus is a file infecting virus that targets the Command.com interpreter in the Windows 95/98 operating system. When executed, it infects other executable files on the system and can cause severe damage to the system. It is important to have updated antivirus software installed to protect against such viruses.
Answer: Option E. -> virus