Computer Science, asked by gm067299, 6 months ago


A. Tick(the correct answer in the
1. Which program can destroy data stored on the computer?
a. Virus
b. Antivirus
c. Spyware

2. Which of these is a characteristic of a computer virus?
a. Replicate itself
b. Both are correct
c. Spread itself

3. Which of these is not a computer virus?
a. Creeper
b. Friday the 13th
c. Norton

4. Which programs are used to steal the personal information of a computer user?
a. Worms
b. Spyware
c. Viruses

5. Which of these is an antivirus software?
a. Kaspersky
c. Both are correct
b. Avast

6. Which viruses attach themselves to the Word or Excel program files?
a.Macro
b. Boot sector
c. File infecting

Answers

Answered by poojarawat7173
0

Explanation:

(a) virus (b) Reblicate Itself (c) Norton ( d) Spyware ( d ) kaspersky ( e ) Macro

Answered by syed2020ashaels
0

The right response is a. Virus. A virus is a kind of malicious software that can harm a computer by erasing, changing, or stealing data. It may spread via email attachments, infected files, and the internet.

  • The right response is b. They are both right. An example of harmful software that may reproduce and propagate to other systems is a computer virus. By modifying or erasing files, stealing personal data, or constructing backdoors for hackers, it can harm computer systems.

  • The right response is c. Norton. Norton is antivirus software rather than a computer virus. In the 1970s and 1980s, early computer viruses like Friday the 13th and Creeper were developed.

  • The right response is b. Spyware. Spyware is a kind of malicious software that may take a computer user's personal information, including login information, credit card numbers, and browser history. Without the user's awareness, it may be downloaded or attached to emails and installed on computers.

  • The right response is either Kaspersky or Avast. Antivirus programs like Kaspersky and Avast can shield a computer against malware such as viruses and spyware. These tools operate by scanning files for harmful code, identifying it, and either quarantining or eradicating it from the system.

  • The right response is a. Macro. Computer infections known as macro viruses affix themselves to Word or Excel software files. They can damage a computer system by destroying or modifying data, making it susceptible to other viruses, and spreading through email attachments or infected documents.

For more questions on Computer Science

https://brainly.in/question/331320

#SPJ3

Similar questions