• Boot Sector Virus : Spreads by passing of floppy disks. Substitutes its code for DOS boot sector or Master Boot Record. Used to be very common in 1980's and 1990's.
• Polymorphic Virus: Virus that has the ability to “change” its own code to avoid detection by signature scanners.
• Macro Virus: Is based on a macro programming language of a popular application e.g. MS Word and Excel.
• Stealth Virus: Virus that has the ability to hide its presence from the user. The virus may maintain a copy of the original, uninfected data and monitor system activity.
jim items answered the question on March 15, 2019 at 10:03
-
Outline the services obtained from a computer IP security mechanisms.
(Solved)
Outline the services obtained from a computer IP security mechanisms.
Date posted:
March 15, 2019
.
Answers (1)
-
Outline FOUR uses of a Computer IP security.
(Solved)
Outline FOUR uses of a Computer IP security.
Date posted:
March 15, 2019
.
Answers (1)
-
Explain the TWO types of Elements of computer windowing systems
(Solved)
Explain the TWO types of Elements of computer windowing systems
Date posted:
March 15, 2019
.
Answers (1)
-
Explain THREE types of computer design rules.
(Solved)
Explain THREE types of computer design rules.
Date posted:
March 13, 2019
.
Answers (1)
-
In details discuss the pros and cons of an incremental computer software process model.
(Solved)
In details explain the pros and cons of an incremental computer software process model.
Date posted:
March 13, 2019
.
Answers (1)
-
Explain THREE types of computer software process models.
(Solved)
Explain THREE types of computer software process models.
Date posted:
March 13, 2019
.
Answers (1)
-
Explain THREE components of a software process model.
(Solved)
Explain THREE components of a software process model.
Date posted:
March 13, 2019
.
Answers (1)
-
Define a computer software process model.
(Solved)
Define a computer software process model.
Date posted:
March 13, 2019
.
Answers (1)
-
Explain the main roles of computer Software processes.
(Solved)
Explain the main roles of computer Software processes.
Date posted:
March 13, 2019
.
Answers (1)
-
Outline FIVE phases of software development life cycle (SDLC).
(Solved)
Outline FIVE phases of software development life cycle (SDLC).
Date posted:
March 13, 2019
.
Answers (1)
-
What is a soft ware life-cycle?
(Solved)
What is a soft ware life-cycle?
Date posted:
March 13, 2019
.
Answers (1)
-
Outline the main problems facing computer modelling tools.
(Solved)
Outline the main problems facing computer modelling tools.
Date posted:
March 12, 2019
.
Answers (1)
-
Explain the Keyboard Layout
(Solved)
Explain the Keyboard Layout
Date posted:
March 12, 2019
.
Answers (1)
-
Give the advantages of laptops.
(Solved)
Give the advantages of laptops.
Date posted:
March 12, 2019
.
Answers (1)
-
Distinguish between a centralized and a client computer Database management systems
(Solved)
Distinguish between a centralized and a client computer Database management systems.
Date posted:
March 12, 2019
.
Answers (1)
-
Discuss the functions of computer Database system utilities.
(Solved)
Discuss the functions of computer Database system utilities.
Date posted:
March 12, 2019
.
Answers (1)
-
What are the most commonly used computer DBMS interfaces?
(Solved)
What are the most commonly used computer DBMS interfaces?
Date posted:
March 12, 2019
.
Answers (1)
-
Discuss the types of computer DBMS Languages.
(Solved)
Discuss the types of computer DBMS Languages.
Date posted:
March 12, 2019
.
Answers (1)
-
Explain two types of computer data independence.
(Solved)
Explain two types of computer data independence.
Date posted:
March 12, 2019
.
Answers (1)
-
Discuss the types of database states and database schema as studied in computer applications.
(Solved)
Discuss the types of database states and database schema as studied in computer applications.
Date posted:
March 11, 2019
.
Answers (1)