Computer Science, asked by benithomsangma, 4 months ago

Write True or False:- 1× 10 =10

i. A polymorphic virus only infects boot record program in a hard disk.

ii. You should always open email attachments after scanning them.

iii. Virus can infect files on CD-ROMs and DVD-ROMs.

iv. The Polystar tool is used to draw polygons or stars.

v. Items placed on the Paste board are visible in the final animation.

vi. You can also use the selection tool to reshape lines and shape outlines.

vii. The <br> tag is an empty tag and does not have any attribute.

viii. Hypertext is the method to move from one web page to another on the WWW.

ix. A chart that combines two or more chart types in a single chart is combo chart

x. All formulas in Excel start with an equal (=) sign.

.

Q 3. Choose the correct answer:- 1 × 10

a) The base of the octal number system is (i) 16 (ii) 8

b) An equation used to perform calculation on the data and produce a result in a

worksheet is called a (i) formula (ii) operator

c) The error that occurs when a column is not wide enough to display the result

of a formula is (i) #NUM (ii) ######

d) The Z to A button sorts data in (i) ascending order (ii) descending

order

e) A chart that combines two or more chart types in a single chart is called a (i)

combo chart (ii) Pie cha​

Answers

Answered by aditya4346
1

Answer:

151 - 200 201 - 229

Cyber Security Techniques Uttarakhand Open University UNIT II: DESKTOP SECURITY AND MALWARE 2.1 LEARNING OBJECTIVES After going through this unit, you will be able to:  Understand different types of Malware & their Classification  Understand Propagation Mechanisms  Know Perpetrators and Motivation  Detect and Remove Malware  Safeguard Ourselves from different types of attacks 2.2 INTRODUCTION Malware is short for ―Malicious software‖ - computer programs designed to infiltrate and damage computers without the users consent. They are used by cybercriminals, hacktivists and nation states to steal personal or professional data, bypass access controls and otherwise cause harm to the host system. Appearing in the form of executable code, scripts, active content or other software variants, there are many different classes of malware which possess varying means of infecting machines and propagating themselves. This unit explains, what malware is, the types of malware and how they operate, recent trends in malware capabilities, behaviors, and incidents, and what makes systems vulnerable to malware infection. In a broader way, malware is software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an Information System. The ―adverse impact‖ is not limited only to loss of confidentiality, integrity, availability, it includes loss of any required property of the targeted information system, including dependability, usability, performance, and privacy. Perhaps the most sophisticated types of threats to computer systems are presented by programs that exploit vulnerabilities in computing systems. The chapter begins with discussion on different categories of malware- although being functionally different you can always find them in hybrid mode, we will talk that later - with a survey of various types of malware, with a more detailed look at the nature and characteristics. We then look into various classification based on the nefarious capabilities they possess and their surviving mechanisms. We will further learn the threats they pose in the contemporary malware realm the safe guard and best practices /countermeasures. At the end of this chapter you will definitely become “malAware”

hope you understand

please add me in brainlist

THANK YOU

Similar questions