Curioustab
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Home
»
Computer Science
»
Operating Systems Concepts
Trojan-Horse programs
are legitimate programs that allow unauthorized access
do not usually work
are hidden programs that do not show up on the system
usually are immediately discovered
None of the above
Correct Answer:
are legitimate programs that allow unauthorized access
← Previous Question
Next Question→
More Questions from
Operating Systems Concepts
What is the name of the technique in which the operating system of a computer executes several programs concurrently by switching back and forth between them?
In which way(s) a macro processor for assembly language can be implemented:
Block caches or buffer caches are used
Operating system
What problem is solved by Dijkstra's banker's algorithm?
The function(s) of the Storage Assignment is (are)
Which of the following is a type of systems software used on microcomputers?
Producer consumer problem can be solved using
If the number of bits in a virtual address of a program is 16 and the page size is 0.5 K bytes, the number of pages in the virtual address space is
Software that measures, monitors, analyzes, and controls real-world events is called:
Discussion & Comments
No comments yet. Be the first to comment!
Name:
Comment:
Post Comment
Join Discussion
Discussion & Comments