L
Q. A program that performs a useful task while simultaneously allowing destructive acts is:
Trojan horses are software programs that masquerade or disguise as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer. For example, a Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data. While this is certainly something you want to avoid, it is good to know that these malicious programs are only dangerous if they are given a chance to run. Also, most antivirus programs can catch Trojan horses when scanning for viruses. Unlike viruses, however, Trojan horses don't replicate themselves. Though it is possible for a Trojan horse to be attached to a virus file that spreads to multiple computers.
You must be Logged in to update hint/solution
Q. Some websites provide free download of softwares, tutorials and benchmarks are called
Q. If you change Windows 98 to Windows XP, you are actually performing _____
Q. The basic input /output system (BIOS) is stored in:
Q. Which of the protocol is not used in the network layer of the TCP/IP model?
Q. Which term is not used to describe the memory component of a computer?
Q. The process of dividing the disk into tracks and sectors is called?
Q. The first generation computers used ____ for circuitry.
Q. What type of chart will you use to compare performance of two employees in the year 2016 ?
Discusssion
Login to discuss.