A) System infectors
B) Trojan
C) Stealth virus
D) Boot infectors
View Answer
Option – C.
Similar Questions
The perimeters of a square and an equilateral triangle are equal. If the diagonal of the square is 9 cm, what is the area of the equilateral triangle?
If x and y are the two digits of the number 653xy such that this number is divisible by 80, then x+y is equal to ?
prp qrp prr pqr qrp rpr qqr rpr qpr qrr qpr qpr If every third letter starting from the left is replaced by a number beginning with 1 then which letter/ number will be 16th from the right?
Twenty men can do a work in eighteen days. Eighteen women can complete the same work in fifteen days. What is the ratio between the capacity of a woman and a man ?
The first indian to enter the Indian Civil Service was
The simple interest accrued on a sum of money at the end of four years is 1/5th of its principal. What is the rate of interest per annum?
Codes consisting of bars or lines of varying widths or lengths that are computer readable are known as ____
The eighty-sixth Amendment of the Constitution of India altered a Directive Principle of the Constitution to provide for
During the recent Venus transit (June 2012), the planet appeared as a tiny black circle moving on the Sun. The black colour on the sun is because the planet :
Which of the following is not true about bottom-up estimating?