Out of the following, which one will be altered or modified by a computer virus
Operating system
Speed of Network connectivity
Application software
All of these
A digital code attached to an electronic message to provide it unique identity.
E- code
Digital certificate
Digital signature
Digital id
Digital code attached to a message that uniquely identifies the message is called
Digital Signature
Digital Certificate
Digital proof
Digital ID
A _____ is a program that ears up all the space by replicating itself.
Trojan Horse
Hacker
Worm
Pirate
Unlike a computer virus a ________ can replicate itself automatically.
Spam
Spoof
Backup
________ and _________ are the two types of malware.
Harcker and cracker
Harmware and Un-ware
Viruses and Trojans
None of these
____ attack eats up all the resources of a system and halts it.
Sweeper
Denial services
virus
Which of the following is not a recovery software?
PC Inspector
TaskZip
VirtualLab
Stellar Phoenix
Which of the following backup methods copies files or folders without any compression?
Full
Differential
Incremental
Mirror
Type of back up in which only the data that changed since last backup is saved.
Add backup
Differential backup
Copy - backup