A. Trojan horse.
B. Virus.
C. Time bomb.
D. Time-related bomb sequence.
Related Mcqs:
- _____________is a windows utility program that locates and eliminates unncessary fragments and rearranges filed and unused disk space to optimize operations?
A. Backup
B. Disk cleanup
C. Disk Defragmenter
D. Restore - A computer program that converts an entire program into machine language is called a/an
A. Interpreter
B. Simulator
C. Compiler
D. Commander - A computer program that translates one program instructions at a time into machine language is called a/an___________?
A. Interpreter
B. CPU
C. Compiler
D. Simulator - When creating a computer program, the____________designs the structure of the program?
A. End user
B. System Analyst
C. Programmer
D. All of the above - A detailed written description of the programming cycle and the program, along with the test results and a printout of the program is called___________?
A. documentation
B. output
C. reporting
D. spec sheets - Magnetic disk is an example of____________?
A. Secondary memory
B. Primary memory
C. Main memory
D. Both (1) and (2) - Disk and tape drives are commonly used?
A. Hard copy
B. Soft copy
C. Secondary storage devices
D. none of the aboveSubmitted by: Satish Ithamsetty
- A master document contains___________, each of which contains a pointer to a file on a disk ?
A. sub-documents
B. hyperlink
C. bookmarks
D. PlaceholdersSubmitted by: Malik Asghar Hussain
- Hard disk drives are considered _________ storage.
A. flash
B. nonvolatile
C. nonpermanent
D. temporarySubmitted by: Habib Baloch
- ” Disk Cleanup” is a/an:________?
A. Device Driver
B. Productivity driver
C. File Manger
D. Utility MangerSubmitted by: Farhan Rana
The correct answer to the question: "An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?" is "Virus.".