Which of the following is a virus hoax?

a. Zafi.d
b. Bropia
c. Jdbgmgr
d. Santy


ANS: C

Computer Science & Information Technology

You might also like to view...

A _________ attack exploits the fact that an encryption or decryption algorithm often takes slightly different amounts of time on different inputs. ?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is an example of an instant messaging service?

A) Monster B) Yahoo Messenger C) Flickr D) LinkedIn

Computer Science & Information Technology

What command can be used to flush the local DNS cache on a Windows computer?

A. nslookup -f B. ipconfig /flushdns C. dns dump D. service dnscache restart

Computer Science & Information Technology

_____, another type of pseudo selector, is an object that exists only in the rendered page.?

A. ?Pseudo-class B. ?Pseudo-element C. ?Pseudo-object D. ?Pseudo-type

Computer Science & Information Technology