GAQM CITM-001 Practice Test - Questions Answers, Page 8
Related questions
Which of the following virus is a script that attaches itself to a file or template?
E-mail virus
Boot sector
Macro virus
Trojan horse
Choose the malicious code which can distribute itself without using having to attach to a host file.
A virus.
A logic bomb.
A worm.
A Trojan horse.
A malicious program that records a user's keystrokes is an example of:
a Trojan horse.
adware.
an anti-virus program.
a performance monitor.
_______________ interdependence occurs when two organizations depend on each other.
Pooled
Reciprocal
Peer
Sequential
________________ interdependence occurs when the output of one unit is the input to another.
Sequential
Random
Dynamic
Reciprocal
Which of the following best suits the statement below? It's the main memory of the computer system and is volatile
Ram
Rom
Prom
Hard disk
All of the following are processing modes except:
Batch processing
Time-sharing
Process
Online
_____________ occurs because the data we want may not be directly under the read-write heads.
Sequential delay
Rotational delay
Seek time
Collision time
DBMS stands for
Data Base Marginal System
Directory Based Management System
Data Base Management System
Dual Base Management System
Question