logo

CuriousTab

CuriousTab

Discussion


Home General Knowledge Computer Comments

  • Question
  • Which mechanism is used by the computer virus 'worm' to duplicate itself?


  • Options
  • A. Swap
  • B. Increment
  • C. Spawn
  • D. Swarm

  • Correct Answer
  • Spawn 


  • Computer problems


    Search Results


    • 1. In Computer programming API is set of subroutinedefinitions, protocols, and tools for building software andapplications. Which among the following is an applicationprogramming interface for the programming language Java,which defines how a client may access a database?

    • Options
    • A. J2EE
    • B. JDK
    • C. JAVA SE
    • D. JDBC
    • Discuss
    • 2. Which of the following error occurs when software tries toaccess protected memory?

    • Options
    • A. Segmentation Fault
    • B. Display time Error
    • C. IO Error
    • D. Runtime Error
    • Discuss
    • 3. Which is a feature included in Microsoft PowerPointsoftware that allows the user to see all the slides in apresentation at one time?

    • Options
    • A. Slide Sorter
    • B. Slide Master
    • C. Handout Master
    • D. Slide Header
    • Discuss
    • 4. Which among the given options is IBMs Supercomputer?

    • Options
    • A. Tihane-2
    • B. SunwayTaihu Light
    • C. Watson
    • D. Shasra-T
    • Discuss
    • 5. Which among the following is a recently debated principlethat Internet service providers and governments regulatingthe Internet should treat all data on the Internet the same,not discriminating or charging differentially by user, content,website, platform, application, type of attached equipment,or mode of communication?

    • Options
    • A. Comcast
    • B. Net Neutrality
    • C. Oblique-net
    • D. Net Fraternity
    • Discuss
    • 6. Related to computers, what is 'Wetware' ?

    • Options
    • A. Computer programs
    • B. Circuitory
    • C. Human brain
    • D. Chemical storage devices
    • Discuss
    • 7. In IT, the method for updating the main memory as soon as a word is removed from the cache is called

    • Options
    • A. Write-through
    • B. Write-back
    • C. Protected-write
    • D. Cache-write
    • Discuss
    • 8. __________ is a type of computing that performs computation, storage and even applications as a service across a network.

    • Options
    • A. Cloud Computing
    • B. Distributed Computing
    • C. Parallel Computing
    • D. Virtual Computing
    • Discuss
    • 9. C++ is ________.

    • Options
    • A. an operating system
    • B. a programming language
    • C. a software
    • D. None of these
    • Discuss
    • 10. In IT, associative memory is called as

    • Options
    • A. Virtual memory
    • B. Cache memory
    • C. Content addressable memory
    • D. Main memory
    • Discuss


    Comments

    There are no comments.

Enter a new Comment