A. E-mail virus.
B. Macro virus.
C. Trojan horse.
D. Time bomb.
Related Mcqs
Related Mcqs
- The_____________data mining technique derives rules from real-world case examples??
- Which of the following contains permanent data and gets updated during the processing of transactions??
- What is a portion of a document in which you set certain page formatting options??
- Single spacing in MS-Word document causes ____ point line spacing??
- Coded entries which are used to gain access to a computer system are called__________??
- Ctrl S Shortcut is used in Microsoft Word to_____________??
- A computer cannot ‘boot’ if it does not have the__________??
- A computer program that translates one program instructions at a time into machine language is called a/an___________??
Related Mcqs:
- What is gutter margin in Ms Word??
- In 1999, the Melissa virus was a widely publicized:_____________??
- The Parliament enjoys legislative power over subjects in __________?
- The weakness section of a diamond riveting is the section which passes through
- In Microsoft Word the shortcut SHIFT DELETE is used to____________??
- What is the smallest width of a column in MS Word ?
- ACL stands for ___________??
- ECL stands for _______________?
- What is the full form of ECL??
- Nucleic acids form: