Determine if d can correctly decide whether cv is a virus

Assignment Help Basic Computer Science
Reference no: EM131211961

The question arises as to whether it is possible to develop a program that can analyze a piece of software to determine if it is a virus. Consider that we have a program D that is supposed to be able to do that. That is, for any program P, if we run D(P), the result returned is TRUE (P is a virus) or FALSE (P is not a virus). Now consider the following program:

1487_f4e2350c-58f5-4f55-9ab0-f0125bcf0d5f.png

In the preceding program, infect-executable is a module that scans memory for executable programs and replicates itself in those programs. Determine if D can correctly decide whether CV is a virus.

Reference no: EM131211961

Questions Cloud

What is the maximum amount of the allocated file space : Consider a file of n records with a blocking factor of F, and suppose that a simple one-level index is used as a file allocation table.
Create a flowchart that will contain : Create a flowchart that will contain two modules, one to prompt the user to input the sales amount, and the other to calculate the amount of sales tax on that sales amount.
Define critical accounting theory : ACC03032- Contemporary issues in accounting. Define critical accounting theory; Assess the neutrality and objectivity of financial reports from a critical perspective of accounting; Assess research based on Positive Accounting and Legitimacy Theories..
What are the uses of context free grammars : What are the uses of Context Free Grammars? What are the applications of Context Free Languages?
Determine if d can correctly decide whether cv is a virus : In the preceding program, infect-executable is a module that scans memory for executable programs and replicates itself in those programs. Determine if D can correctly decide whether CV is a virus.
Discuss stable versus unstable ones : A sorting algorithm is stable if elements with equal keys are left in the same order as they occur in the input. Look at the sorting algorithms presented in this chapter. Discuss stable versus unstable ones.
What is the role of compression in the operation of a virus : What is the role of compression in the operation of a virus?
Designing a large-scale system : Explain the trade-offs between system scalability and system transparency you may encounter when designing a large-scale system.
Contents of the vector before sorting : 1. Implement the following method public void sort_vec(Vector v) that will sort the vector v in acsending order 2. Now call this method in the main program. in the main program , they must randomly generate 100 int ranging from 1-150 to be placed i..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Define information-gathering technique

Describe how joint application design (JAD) might be considered a better information-gathering technique than the traditional method of requirements gathering. What are its shortcomings

  Implement fast-forward and reverse for mpeg streams

What problems do you run into if you limit your mechanism to displaying I frames only? If you don't, then to display a given frame in the fast-forward sequence, what is the largest number of frames in the original sequence you may have to decode?

  System administration automation

System Administration Automation

  Powerful component of ssis

Question: Explain why variables called the most powerful component of SSIS.

  Calculate the velocity and acceleration vectors

Calculate the velocity and acceleration vectors and the speed at t=pi/4 for a particle whose position at time t isgiven by vector r(t)=(cost t) i +( cos 2t) j +( cos 3t) k.

  Inserting radio-frequency identification

Some organizations have gone as far as inserting radio-frequency identification (RFID) chips into their employees to control their access into secure areas and to monitor their movement and location.

  Which solution do you consider to have better application

Remember to properly cite your sources according to APA guidelines.

  Utilizing the concepts of this unit and the earlier units

Assume that you are going to start a small business of your own. Describe the business and, utilizing the concepts of this unit and the earlier units, discuss: what costs you would incur;

  Discussion of cultural differences

Include a discussion of how cultural differences could make keeping your information secure more difficult.

  Characterizing data types

Characterizing Data Types Please respond to the following: Justify characterizing data types according to task taxonomy.

  Create a database schema that supports the companys business

Create a database schema that supports the companys business and processes - Explain and support the database schema with relevant arguments that support the rationale for the structure.

  Disadvantage of asynchronous transmission

What is a major disadvantage of asynchronous transmission? How is synchronization provided for synchronous transmission? Give examples of asynchronous and synchronous transmission applications. What is a parity bit?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd