SlideShare a Scribd company logo
Which of the following types of viruses can infect both boot sectors and program files?
A. File infector
B. Multipartite
C. Polymorphic
D. System infector
Solution
B. A multipartite virus can infect both boot sectors and program files. Answer A is incorrect
because file infector viruses infect files. Answer C is incorrect because a polymorphic virus is
one that has the capability to change. Answer D is incorrect because system infector viruses
infect system files

More Related Content

More from arvindarora20042013

A positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdfA positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdf
arvindarora20042013
 
Asse Place the following in chronological order as fluid flow Bloo.pdf
Asse  Place the following in chronological order as fluid flow  Bloo.pdfAsse  Place the following in chronological order as fluid flow  Bloo.pdf
Asse Place the following in chronological order as fluid flow Bloo.pdf
arvindarora20042013
 
Add the binary number Convert the following unsigned hexadecimal num.pdf
Add the binary number  Convert the following unsigned hexadecimal num.pdfAdd the binary number  Convert the following unsigned hexadecimal num.pdf
Add the binary number Convert the following unsigned hexadecimal num.pdf
arvindarora20042013
 
A wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdfA wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdf
arvindarora20042013
 
A laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdfA laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdf
arvindarora20042013
 
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
arvindarora20042013
 
Which one is NOT typical of a ceramic material low melting point h.pdf
Which one is NOT typical of a ceramic material  low melting point  h.pdfWhich one is NOT typical of a ceramic material  low melting point  h.pdf
Which one is NOT typical of a ceramic material low melting point h.pdf
arvindarora20042013
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
arvindarora20042013
 
What ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdfWhat ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdf
arvindarora20042013
 
What is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdfWhat is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdf
arvindarora20042013
 
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
arvindarora20042013
 
The vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdfThe vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdf
arvindarora20042013
 
The pedigree below shows the inheritance pattern of Bt resistance in .pdf
The pedigree below shows the inheritance pattern of Bt resistance in .pdfThe pedigree below shows the inheritance pattern of Bt resistance in .pdf
The pedigree below shows the inheritance pattern of Bt resistance in .pdf
arvindarora20042013
 
The horizontal blocks below help summarize functional features associ.pdf
The horizontal blocks below help summarize functional features associ.pdfThe horizontal blocks below help summarize functional features associ.pdf
The horizontal blocks below help summarize functional features associ.pdf
arvindarora20042013
 
Thank you. Give an example of a linear transformation T V rightarro.pdf
Thank you. Give an example of a linear transformation T V rightarro.pdfThank you. Give an example of a linear transformation T V rightarro.pdf
Thank you. Give an example of a linear transformation T V rightarro.pdf
arvindarora20042013
 
1. Name and explain two things that all four macromolecules share in .pdf
1. Name and explain two things that all four macromolecules share in .pdf1. Name and explain two things that all four macromolecules share in .pdf
1. Name and explain two things that all four macromolecules share in .pdf
arvindarora20042013
 
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdfProblem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
arvindarora20042013
 
Measure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdfMeasure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdf
arvindarora20042013
 
Java!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdfJava!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdf
arvindarora20042013
 

More from arvindarora20042013 (19)

A positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdfA positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdf
 
Asse Place the following in chronological order as fluid flow Bloo.pdf
Asse  Place the following in chronological order as fluid flow  Bloo.pdfAsse  Place the following in chronological order as fluid flow  Bloo.pdf
Asse Place the following in chronological order as fluid flow Bloo.pdf
 
Add the binary number Convert the following unsigned hexadecimal num.pdf
Add the binary number  Convert the following unsigned hexadecimal num.pdfAdd the binary number  Convert the following unsigned hexadecimal num.pdf
Add the binary number Convert the following unsigned hexadecimal num.pdf
 
A wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdfA wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdf
 
A laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdfA laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdf
 
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
 
Which one is NOT typical of a ceramic material low melting point h.pdf
Which one is NOT typical of a ceramic material  low melting point  h.pdfWhich one is NOT typical of a ceramic material  low melting point  h.pdf
Which one is NOT typical of a ceramic material low melting point h.pdf
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
What ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdfWhat ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdf
 
What is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdfWhat is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdf
 
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
 
The vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdfThe vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdf
 
The pedigree below shows the inheritance pattern of Bt resistance in .pdf
The pedigree below shows the inheritance pattern of Bt resistance in .pdfThe pedigree below shows the inheritance pattern of Bt resistance in .pdf
The pedigree below shows the inheritance pattern of Bt resistance in .pdf
 
The horizontal blocks below help summarize functional features associ.pdf
The horizontal blocks below help summarize functional features associ.pdfThe horizontal blocks below help summarize functional features associ.pdf
The horizontal blocks below help summarize functional features associ.pdf
 
Thank you. Give an example of a linear transformation T V rightarro.pdf
Thank you. Give an example of a linear transformation T V rightarro.pdfThank you. Give an example of a linear transformation T V rightarro.pdf
Thank you. Give an example of a linear transformation T V rightarro.pdf
 
1. Name and explain two things that all four macromolecules share in .pdf
1. Name and explain two things that all four macromolecules share in .pdf1. Name and explain two things that all four macromolecules share in .pdf
1. Name and explain two things that all four macromolecules share in .pdf
 
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdfProblem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
Problem 6.64 sace trig t onta Foe-tT is exerted on the object. At t .pdf
 
Measure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdfMeasure the accounting for foreign currency and its translation.Sc.pdf
Measure the accounting for foreign currency and its translation.Sc.pdf
 
Java!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdfJava!!!!!Create a program that authenticates username and password.pdf
Java!!!!!Create a program that authenticates username and password.pdf
 

Recently uploaded

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Which of the following types of viruses can infect both boot sectors.pdf

  • 1. Which of the following types of viruses can infect both boot sectors and program files? A. File infector B. Multipartite C. Polymorphic D. System infector Solution B. A multipartite virus can infect both boot sectors and program files. Answer A is incorrect because file infector viruses infect files. Answer C is incorrect because a polymorphic virus is one that has the capability to change. Answer D is incorrect because system infector viruses infect system files