An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse.

B. Virus.

C. Time bomb.

D. Time-related bomb sequence.

You can do it yup
  1. Which computer support co-processors?
  2. Which device can understand difference between data & programs?
  3. Hard disk is coated in both side with
  4. The memory which is programmed at the time it is manufactured
  5. The data recording format in most of the modern magnetic tape is
  6. Instructions and memory address are represented by
  7. Which of the following printing devices an output composed of a series of data?
  8. 1 Byte =?
  9. An approach that permits the computer to work on several programs instead of one is
  10. Which of the following is the largest manufacturer of Hard Disk Drives?
  11. The computer size was very large in
  12. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the…
  13. Which statement is valid about computer program?
  14. Which of the following is the smallest storage?
  15. In order to play and hear sound on a computer, one needs:
  16. Which unit converts user data into machine readable form?
  17. Which of the following is considered first computer in the world?
  18. What type of resource is most likely to be a shared common resource in a computer Network?
  19. A digital computer did not score over an analog computer in terms of
  20. EBCDIC stands for
  21. Symbolic logic was discovered by
  22. WAN stands for
  23. ________ refers to electronic trespassing or criminal hacking.
  24. What type of computers are client computers (most of the time) in a client-server system?
  25. Switching device of fifth generation computer is________
  26. All modern computer operate on
  27. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
  28. A DVD is an example of a (n)-
  29. The proper definition of a modern digital computer is
  30. Is an OOP principle