Home
Class 14
GENERAL KNOWLEDGE
Which of the following is the proper rem...

Which of the following is the proper removal of any malicious program from a computer system?

A

Reconfiguration

B

Reboot

C

Restart

D

only b and c

Text Solution

Verified by Experts

The correct Answer is:
D

Malicious programs are used to attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Normally such a program can be removed by simply unintalling it. However, a reboot will be requried to completely remove it from the system.
Promotional Banner

Topper's Solved these Questions

  • BANKING SYSTEM IN INDIA & WORLD

    IBPS & SBI PREVIOUS YEAR PAPER|Exercise MCQs|84 Videos
  • CURRENT AFFAIRS

    IBPS & SBI PREVIOUS YEAR PAPER|Exercise MCQ|304 Videos
IBPS & SBI PREVIOUS YEAR PAPER-COMPUTER KNOWLEDGE-MCQs
  1. Through which of the following ways can devices be connected to a comp...

    Text Solution

    |

  2. Which of the following is the correct sequence of compilation?

    Text Solution

    |

  3. Which of the following is the proper removal of any malicious program ...

    Text Solution

    |

  4. What is the process of copying software programs from secondary storag...

    Text Solution

    |

  5. We regularly come across some lines marked on the back of products. Wh...

    Text Solution

    |

  6. In the field of computers, which of the following converts input into ...

    Text Solution

    |

  7. Which application is used for the purposes of basic accounting?

    Text Solution

    |

  8. How can one see the content of a file?

    Text Solution

    |

  9. What is it called when computer connects to other computer and sends i...

    Text Solution

    |

  10. How can a file be saved in a computer with other name?

    Text Solution

    |

  11. What is full form of BIOS?

    Text Solution

    |

  12. A person who used his or her expertise to gain access to other peoples...

    Text Solution

    |

  13. To access properties of an object, the mouse technique to use is

    Text Solution

    |

  14. Computers used thenumber systems to store data and perform calculation...

    Text Solution

    |

  15. The default view in Excel isview.

    Text Solution

    |

  16. In word you can force a page break.

    Text Solution

    |

  17. Specialized programs that assist users in locating information on the ...

    Text Solution

    |

  18. Q.Compiling creates a/an

    Text Solution

    |

  19. What is the name given to those applications that combine text, sound,...

    Text Solution

    |

  20. How are the World wide web (WWW) and the internet different?

    Text Solution

    |