SlideShare a Scribd company logo
1 of 1
Download to read offline
Which of the following types of viruses can infect both boot sectors and program files?
A. File infector
B. Multipartite
C. Polymorphic
D. System infector
Solution
B. A multipartite virus can infect both boot sectors and program files. Answer A is incorrect
because file infector viruses infect files. Answer C is incorrect because a polymorphic virus is
one that has the capability to change. Answer D is incorrect because system infector viruses
infect system files

More Related Content

More from arvindarora20042013

A wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdfA wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdf
arvindarora20042013
 
A laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdfA laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdf
arvindarora20042013
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
arvindarora20042013
 
Measure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdfMeasure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdf
arvindarora20042013
 
Java!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdfJava!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdf
arvindarora20042013
 

More from arvindarora20042013 (19)

A positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdfA positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdf
 
Asse Place the following in chronological order as fluid flow Bloo.pdf
Asse  Place the following in chronological order as fluid flow  Bloo.pdfAsse  Place the following in chronological order as fluid flow  Bloo.pdf
Asse Place the following in chronological order as fluid flow Bloo.pdf
 
Add the binary number Convert the following unsigned hexadecimal num.pdf
Add the binary number  Convert the following unsigned hexadecimal num.pdfAdd the binary number  Convert the following unsigned hexadecimal num.pdf
Add the binary number Convert the following unsigned hexadecimal num.pdf
 
A wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdfA wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdf
 
A laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdfA laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdf
 
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
 
Which one is NOT typical of a ceramic material low melting point h.pdf
Which one is NOT typical of a ceramic material  low melting point  h.pdfWhich one is NOT typical of a ceramic material  low melting point  h.pdf
Which one is NOT typical of a ceramic material low melting point h.pdf
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
What ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdfWhat ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdf
 
What is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdfWhat is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdf
 
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
 
The vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdfThe vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdf
 
The pedigree below shows the inheritance pattern of Bt resistance in .pdf
The pedigree below shows the inheritance pattern of Bt resistance in .pdfThe pedigree below shows the inheritance pattern of Bt resistance in .pdf
The pedigree below shows the inheritance pattern of Bt resistance in .pdf
 
The horizontal blocks below help summarize functional features associ.pdf
The horizontal blocks below help summarize functional features associ.pdfThe horizontal blocks below help summarize functional features associ.pdf
The horizontal blocks below help summarize functional features associ.pdf
 
Thank you. Give an example of a linear transformation T V rightarro.pdf
Thank you. Give an example of a linear transformation T V rightarro.pdfThank you. Give an example of a linear transformation T V rightarro.pdf
Thank you. Give an example of a linear transformation T V rightarro.pdf
 
1. Name and explain two things that all four macromolecules share in .pdf
1. Name and explain two things that all four macromolecules share in .pdf1. Name and explain two things that all four macromolecules share in .pdf
1. Name and explain two things that all four macromolecules share in .pdf
 
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdfProblem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
 
Measure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdfMeasure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdf
 
Java!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdfJava!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdf
 

Recently uploaded

QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
httgc7rh9c
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 

Which of the following types of viruses can infect both boot sectors.pdf

  • 1. Which of the following types of viruses can infect both boot sectors and program files? A. File infector B. Multipartite C. Polymorphic D. System infector Solution B. A multipartite virus can infect both boot sectors and program files. Answer A is incorrect because file infector viruses infect files. Answer C is incorrect because a polymorphic virus is one that has the capability to change. Answer D is incorrect because system infector viruses infect system files