Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is difference between spyware and mallware ? why we use
this ?



what is difference between spyware and mallware ? why we use this ? ..

Answer / deena

1. Malware covers a lot of different software, Spyware is just one of them
2. Spyware often doesn’t cause major damage but other malware can
3. While other malware can impair the function of your computer, spyware can extract personal information like credit card numbers
4. Spyware takes up processing power and a part of the bandwidth of your internet connection

Is This Answer Correct ?    3 Yes 1 No

Post New Answer

More Networking Administration Interview Questions

Which command allows you to monitor the routing requests that are not getting resolved from the routing table ?

1 Answers  


Explain the network architecture?

0 Answers  


Solaris will run routed if what file exists.

1 Answers  


You have a Class C network. You want to subnet it such that you have at least 6 hosts per subnet. How many subnets can you have?

1 Answers  


in vcs, which network[private or public] channel bandwidth is high?

0 Answers  


In network topology what is called as one large coaxial cable joins all the computers.

1 Answers  


what is Organiser? what is work

3 Answers   TCS,


How does ToS bit work?

1 Answers   EDS,


What protocol counts hops from router to router to find the shortest path? a. DHCP b. RIP c. SNMP d. IP e. DLC

1 Answers  


Which file serves as the configuration file for sendmail ?

1 Answers  


Draw network configuration and protocol layer interface architecture for a multiprotocol bridge that interconnects an Ethernet LAN to a token-ring LAN.

0 Answers   Kent, Kent State University,


Which of the following protocols are application protocols? a. ARP b. RIP c. FTP d. NFS

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)