An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

A. Trojan horse.

B. Virus.

C. Time bomb.

D. Time-related bomb sequence.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. When was the X window system born?
  2. Which access method is used to access cassette tape?
  3. What is the name of the computer terminal which gives paper printout?
  4. Which of the following is the largest manufacturer of Hard Disk Drives?
  5. The personnel who deals with the computer & its management put together are called
  6. Cursor is a
  7. VGA is
  8. A dumb terminal has
  9. Which of the following is not purely output device?
  10. Office LANS, which are scattered geographically on large scale, can be connected by the use of corporate
  11. Help Menu is available at which button?
  12. Which access method is used for obtaining a record from a cassette tape?
  13. ASCII and EBCDIC are the popular character coding systems. What does ASCII stand for?
  14. The basic operations performed by a computer are
  15. Which computer support co-processors?
  16. Which electronic component was made out of semiconductor material?
  17. Computer is free from tiresome and boardroom. We call it
  18. Which of the following are the two main components of the CPU?
  19. Which is a semi conductor memory?
  20. Which of the following statement is valid?
  21. FORTRAN is
  22. FORTRAN programming language is more suitable for
  23. What type of memory is not directly addressable by the CPU and requires special softw3are called EMS…
  24. Which of the following storage devices can store maximum amount of data?
  25. Access time is
  26. Which of the following is not a storage medium?
  27. A 32 bit microprocessor has the word length equal to
  28. What is the main difference between a mainframe and a super computer?
  29. ________ computer is a medium sized computer
  30. BCD is