Computer Virus



In 1983, Fred Cohen coined the term “computer virus”, postulating a virus was "a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself.” The term virus is actually an acronym for Vital Information Resources Under Seize. Mr. Cohen expanded his definition a year later in his 1984 paper, “A Computer Virus”, noting that “a virus can spread throughout a computer system or network using the authorizations of every user using it to infect their programs. Every program that gets infected may also act as a virus and thus the infection grows.” Computer viruses, as we know them now, originated in 1986 with the creation of Brain - the first virus for personal computers. Two brothers wrote it (Basid and Farooq Alvi who ran a small software house in Lahore, Pakistan) and started the race between viruses and anti-virus programs which still goes on today.
Using the above explanation, it can be said that viruses infect program files. However, viruses can also infect certain types of data files, specifically those types of data files that support executable content, for example, files created in Microsoft Office programs that rely on macros.
Compounding the definition difficulty, viruses also exist that demonstrate a similar ability to infect data files that don't typically support executable content - for example, Adobe PDF files, widely used for document sharing, and .JPG image files. However, in both cases, the respective virus has a dependency on an outside executable and thus neither virus can be considered more than a simple ‘proof of concept’. In other cases, the data files themselves may not be infectable, but can allow for the introduction of viral code. Specifically, vulnerabilities in certain products can allow data files to be manipulated in such a way that it will cause the host program to become unstable, after which malicious code can be introduced to the system. These examples are given simply to note that viruses no longer relegate themselves to simply infecting program files, as was the case when Mr. Cohen first defined the term. Thus, to simplify and modernize, it can be safely stated that a virus infects other files, whether program or data.
Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
There are similarities at a deeper level, as well. A biological virus is not a living thing. A virus is a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself -- it is not alive. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.
A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to get executed. Once it is running, it is then able to infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.
A computer virus is a program that replicates. To do so, it needs to attach itself to other program files (for example, .exe, .com, .dll) and execute whenever the host program executes. Beyond simple replication, a virus almost always seeks to fulfill another purpose: to cause damage.
Called the damage routine, or payload, the destructive portion of a virus can range from overwriting critical information kept on the hard disk's partition table to scrambling the numbers in the spreadsheets to just taunting the user with sounds, pictures, or obnoxious effects.
It’s worth bearing in mind, however, that even without a ”damage routine”, if viruses are allowed to run unabated then it will continue to propagate--consuming system memory, disk space, slowing network traffic and generally degrading performance. Besides, virus code is often buggy and can also be the source of mysterious system problems that take weeks to understand. So, whether a virus is harmful or not, its presence on the system can lead to instability and should not be tolerated.
Some viruses, in conjunction with "logic bombs," do not make their presence known for months. Instead of causing damage right away, these viruses do nothing but replicate--until the preordained trigger day or event when they unleash their damage routines on the host system or across a network.

Impact of Viruses on Computer Systems Virus can be reprogrammed to do many kinds of harm including the following.
1.     Copy themselves to other programs or areas of a disk.
2.     Replicate as rapidly and frequently as possible, filling up the infected system’s disk and memory rendering the systems useless.
3.     Display information on the screen.
4.     Modify, corrupt or destroy selected files.
5.     Erase the contents of entire disks.
6.     Lie dormant for a specified time or until a given condition is met, and then become active.
7.     Open a back door to the infected system that allows someone else to access and even control of the system through a network or internet connection.
8.     Some viruses can crash the system by causing some programs (typically Windows) to behave oddly.

How viruses spread from one system to another?
The most likely virus entry points are email, Internet and network connections, floppy disk drives, and modems or other serial or parallel port connections. In today's increasingly interconnected workplace (Internet, intranet, shared drives, removable drives, and email), virus outbreaks now can spread faster and wider than ever before.

The following are some common ways for a virus to enter the users’ computer system:
•Email attachments
•Malicious scripts in web pages or HTML email
•FTP traffic from the Internet (file downloads)
•Shared network files & network traffic in general
•Demonstration software
•Pirated software
•Shrink-wrapped, production programs (rare)
•Computer labs
•Electronic bulletin boards (BBS)
•Diskette swapping (using other people’s diskettes for carrying data and programs back and forth)

High risk files

The most dangerous files types are: .EXE, .COM, .XLS, .DOC, .MDB
Because they don't need any special conversion to infect a computer -- all they've got to do is run and consequently the virus spreads. It has been estimated that 99% of all viruses are written for these file formats.

A list of possible virus carriers includes:
EXE - (Executable file)
SYS - (Executable file)
COM - (Executable file)
DOC - (Microsoft Word)
XLS - (Microsoft Excel)
MDB - (Microsoft Access)
ZIP - (Compressed file, common in the USA)
ARJ - (Compressed file, common in the USA)
DRV - (Device driver)
BIN - (Common boot sector image file)
SCR - (Microsoft screen saver)

Common Symptoms Of Virus Infection

Computer does not boot.
¯
Computer hard drive space is reduced.¯
Applications will not load.¯
An appli¯cation takes longer to load than normal time period.
Hard dive activity increases especially when nothing is being done on the computer.¯
An anti virus software message appears.
¯
The number of hard drive bad sectors steadily increases.¯
Unusual graphics or messages appear on the screen¯
Files are missing (deleted)¯
A message appears that hard drive cannot be detected or recognized.¯
Strange sounds come from the computer.
¯
Some¯ viruses take control of the keyboard and occasionally substitute a neighboring key for the one actually pressed. Another virus "swallows" key presses so that nothing appears on the screen.
Also interesting¯ are system time effects. Clocks going backwards are especially frightening for workers who cannot wait to go home. More seriously though, this type of virus can cause chaos for programs which depend on the system time or date.
Some viruses can cost the user dearly by¯ dialing out on his modem. We do not know of one which dials premium telephone numbers but no doubt we shall see one soon. One particularly malicious virus dials 911 (the emergency number in the USA) and takes up the valuable time of the emergency services.

Categories of viruses
Depending on the source of information different types of viruses may be categorized in the following ways:

PDA VIRUSES
The increasing power of PDAs has spawned a new breed of viruses. Maliciously creative programmers have leveraged the PDA's ability to communicate with other devices and run programs, to cause digital mayhem.
The blissfully safe world where users of these devices could synchronize and download with impunity came to an end in August 2000 with the discovery of the virus Palm Liberty. Since then, many more viruses have been discovered.
Though not yet as harmful as their PC-based cousins, these viruses still pose a threat to unsuspecting users. Their effects vary from the harmless flashing of an unwanted message or an increase in power consumption, to the deletion of all installed programs. But the threat is growing, and the destructiveness of these viruses is expected to parallel the development of the devices they attack.

MULTIPARTITE VIRUSES
A virus that combines two or more different infection methods is called a multipartite virus. This type of virus can infect both files and boot sector of a disk. Multi-partite viruses share some of the characteristics of boot sector viruses and file viruses: They can infect .com files, .exe files, and the boot sector of the computer’s hard drive. On a computer booted up with an infected diskette, the typical multi-partite virus will first make itself resident in memory then infect the boot sector of the hard drive. From there, the virus may infect a PC's entire environment. Not many forms of this virus class actually exist. However, they do account for a disproportionately large percentage of all infections. Tequila and Anticad are the examples of multipartite viruses.

BOMBS
The two most prevalent types of bombs are time bombs and logic bombs. A time bomb hides on the victim’s disk and waits until a specific date before running. A logic bomb may be activated by a date, a change to a file, or a particular action taken by a user or a program. Bombs are treated as viruses because they can cause damage or disruption to a system.

BOOT SECTOR VIRUSES
Until the mid-1990s, boot sector viruses were the most prevalent virus type, spreading primarily in the 16-bit DOS world via floppy disk. Boot sector viruses infect the boot sector on a floppy disk and spread to a user's hard disk, and can also infect the master boot record (MBR) on a user's hard drive. Once the MBR or boot sector on the hard drive is infected, the virus attempts to infect the boot sector of every floppy disk that is inserted into the computer and accessed. Examples of boot sector viruses are Michelangelo, Satria and Keydrop.
Boot sector viruses work like this: Let us assume that the user received a diskette with an infected boot sector. The user copied data from it but forgot to remove it from drive A:. When he started the computer next time the boot process will execute the infected boot sector program from the diskette. The virus will load first and infect the hard disk. Note that this can be prevented by changing the boot sequence in CMOS (Let C: drive boot before A:). By hiding on the first sector of a disk, the virus is loaded into memory before the system files are loaded. This allows it to gain complete control of DOS interrupts and in the process replaces the original contents of the MBR or DOS boot sector with their own contents and move the original boot sector data to another area on the disk. Because the virus has infected a system area of the hard disk it will be loaded into memory each time the computer is started. It will first take control of the lowest level disk system services before executing the original boot sector code which it has stored in another part of the hard disk. The computer seems to behave exactly as it should. Nobody will notice the extra few fractions of a second added to the boot sequence.
During normal operation the virus will happily stay in memory. Thanks to the fact that it has control of the disk services it can easily monitor requests for disk access - including diskettes. As soon as it gets a request for access to a diskette it will determine that there is a diskette in the floppy drive. It will then examine its boot sector to see if it has already been infected. If it finds the diskette clean it will replace the boot sector with its own code. From this moment the diskette will be a "carrier" and become a medium for infections on other PC's.

The virus will also monitor special disk requests for access to the boot sector. The boot sector contains its own code, and a request to read it could be from an anti-virus program checking for virus presence. The virus will not allow the boot sector to be read and will redirect all requests to the place on the hard disk where it has backed up the original contents. In this way nothing unusual is detected. Such methods are called stealth techniques and their main goal is to mask the presence of the virus. Not all boot viruses use stealth but those which do are common.
Boot viruses also infect the non-file (system) areas of hard and floppy disks. These areas offer an efficient way for a virus to spread from one computer to another. Boot viruses have achieved a higher degree of success than program viruses in infecting their targets and spreading.
Boot virus can infect DOS, Windows 3.x, Windows 95/98, Windows NT, and even Novell Netware systems. This is because they exploit inherent features of the computer (rather than the operating system) to spread and activate.
Cleaning up a boot sector virus can be performed by booting the machine from an uninfected floppy system disk rather than from the hard drive, or by finding the original boot sector and replacing it in the correct location on the disk.

CLUSTER VIRUSES
This type of virus makes changes to a disks file system. If any program is run from the infected disk, the program causes the virus to run as well. This technique creates the illusion that the virus has infected every program on the disk.

E-MAIL VIRUSES
These types of viruses can be transmitted via e-mail messages sent across private networks or the internet. Some e-mail viruses are transmitted as an infected attachment- a document file or program that is attached to the message. This type of virus is run when the victim opens the file that is attached to the message. Other types of email viruses reside within the body of the message itself. To store a virus, the message must be encoded in html format. Once launched many e-mail viruses attempt to spread by sending messages to everyone in the victim’s address book; each of those contains a copy of the virus.
The latest thing in the world of computer viruses is the e-mail virus called Melissa virus which surfaced in March 1999. Melissa spread in Microsoft Word documents sent via e-mail, and it worked like this:
Someone created the virus as a Word document uploaded to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. As a result, the Melissa virus was the fastest-spreading virus ever seen and it forced a number of large companies to shut down their e-mail systems at that time.
The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double clicked on the attachment allowed the code to execute. The code sent copies of itself to everyone in the victim's address book and then started corrupting files on the victim's machine. This is as simple as a virus can get. It is really more of a Trojan horse distributed by e-mail than it is a virus.
The Melissa virus took advantage of the programming language built into Microsoft Word called VBA, or Visual Basic for Applications. It is a complete programming language and it can be programmed to do things like modify files and send e-mail messages. It also has a useful but dangerous auto-execute feature. A programmer can insert a program into a document that runs instantly whenever the document is opened. This is how the Melissa virus was programmed. Anyone who opened a document infected with Melissa would immediately activate the virus. It would send the 50 e-mails, and then infect a central file called NORMAL.DOT so that any file saved later would also contain the virus! It created a huge mess.

FILE INFECTING VIRUSES
File infectors operate in memory and usually infect executable files with the following extensions: *.COM, *.EXE, *.DRV, *.DLL, *.BIN, *.OVL, *.SYS. They activate every time the infected file is executed by copying themselves into other executable files and can remain in memory long after the virus has activated.
Thousands of different file infecting viruses exist, but similar to boot sector viruses, the vast majority operates in a DOS 16-bit environment. Some, however, have successfully infected the Microsoft Windows, IBM OS/2, and Apple Computer Macintosh environments.

How to create a direct connection using Ethernet crossover cable in Windows XP?


Sometimes we have to need data transfer between two PC or Laptop. Today I will share a simple way to data transfer system between two PC or Laptop.
System Requirement:
LAN Card: 2pcs for both PC
Ethernet crossover cable: 5 to 10 Feet
To configure this above system please follow bellow steps:
Step One:
Connect this cable on both systems Computer #1 and Computer#2

Step Two:
IP Configure on Computer #1
Click Start  > Control Panel
Then click Network Connection- Right click on your LAN card > click Advanced tab > Setting > Select Off (Not Recommended) > Then Select Exceptions tab > Mark File and printer Sharing > Click ok Then Select General Tab > Select Internet Protocol (TCP/IP)- Properties then configure your LAN card like:

Then press OK

Step Three:
IP Configure on Computer #2
Click Start  > Control Panel
Then click Network Connection- Right click on your LAN card > click Advanced tab > Setting > Select Off (Not Recommended) > Then Select Exceptions tab > Mark File and printer Sharing > Click ok Then Select GeneralTab > Select Internet Protocol (TCP/IP)Properties then configure your LAN card like:

Then press OK

Step Four:
Now you can share your any drive of folder to others on the same network. To share a folder please follows the bellow steps:
In Computer#1 Right click on your folder then click Sharing tab > Select Share this folder > Apply > Ok like bellow picture:

Step Five:
Go to Computer#2 select Start > Run > write \\192.168.1.100 Then press enter you will see the folder which you share in Computer#1 like:


Now you can do what ever you want on this share folder. That's  all.

Adobe Photoshop CS3 Test Answer


Question: 1
What happens when Use Legacy is selected as shown in the given picture?
a.       It is used to apply proportionate (nonlinear) adjustments to image pixels (Ans)
b.      When it is selected, Brightness/Contrast simply shifts all pixel values higher or lower when adjusting brightness
c.       Both a and b
d.      None of the above

Question: 2
Channels can not be added to which of the following image modes?
a.       RGB
b.      CMYK
c.       Bitmap (Ans)
d.      Lab

Question: 3
The Match Color command works only in the RGB mode.
a.       True (Ans)
b.      False

Question: 4
Which option will you select to convert Types to Shapes?
a.       Choose Select > Type > Convert to Shape
b.      Select a type layer. Right click and select Convert to Shape from the list
c.       Select a type layer. Choose Layer > Type > Convert To Shape
d.      Both b and c (Ans)

Question: 5
In which Format will you save your file to preserve the Alpha channels?
a.       PDF
b.      PICT
c.       Pixar
d.      All of the above (Ans)

Question: 6
Which file format can be used to save Lab images?
a.       Photoshop Raw
b.      TIFF
c.       Large Document Format (PSB)
d.      All of the above (Ans)

Question: 7
Refer to the given image.
Which of the following options displays the Spot Channels in the Channels palette?
a.       A
b.      B (Ans)
c.       C
d.      All of the above

Question: 8
Which option will you select to remove the existing profile from the document in the given image?
a.       A
b.      B
c.       C (Ans)
d.      None of the above

Question: 9
Photoshop supports a maximum pixel dimension of 300,000 by 300,000 pixels per image.
a.       True (Ans)
b.      False

Question: 10
Which option will you choose to refresh a Histogram?
a.       Double-click anywhere in the Histogram
b.      Click the Cached Data Warning icon
c.       Click the Uncached Refresh button
d.      All of the above (Ans)

Question: 11
Which keyboard shortcut (windows) will you choose to permanently Clear History (no Undo)?
  1. Control + Shift + Z
  2. Control + Alt + Z
  3. Shift + Clear History
  4. Alt + Clear History (Ans)
Question: 12
Variable names contain spaces and special characters.
  1. True
  2. False (Ans)
Question: 13
Which View will you choose to display a Histogram with no controls or statistics?
  1. Expanded View
  2. Compact View
  3. All Channels View
  4. All of the above (Ans)
Question: 14
Which option will you select to export layers?
  1. Choose File > Scripts > Export Layers To Files (Ans)
  2. Choose File > Export > Export Layers To Files
  3. Choose File > Place > Export Layers To Files
  4. All of the above
Question: 15
When you create a new image with the transparent content, the image does not have a background layer.
a.       True
b.      False (Ans)

Question: 16
Which of the given options displays an Action Safe Area?
a.       A
b.      B
c.       Both a and b (Ans)
d.      None of the above

Question: 17
Which of the following is not true about the Multichannel mode?
a.       Multichannel mode images contain 256 levels of gray in each channel and are useful for specialized printing (Ans)
b.      When you convert images to the Multichannel mode, the color channels in the original image become spot color channels in the converted image
c.       Converting an RGB image to the Multichannel mode creates cyan, magenta, and yellow spot channels
d.      None of the above

Question: 18
Which keyboard shortcut (windows) will you choose to select the History Brush tool?
a.       Y (Ans)
b.      R
c.       O
d.      H

Question: 19
When will the Dynamic shortcuts appear in the Character Palette Menu as shown in the picture?
a.       When you are entering the Point type
b.      When you are entering the Paragraph type
c.       When the I-beam is in text
d.      All of the above (Ans)

Question: 20
The individual Histograms in the All Channels View does not include which of the following?
a.       Alpha channels
b.      Spot channels
c.       Masks
d.      All of the above (Ans)

Question: 21
Which among the following is not a right option for selecting a web-safe color from the Color Palette?
a.       Choose Make Ramp Web Safe from the Color Palette Menu 
b.      Choose Web Color Sliders from the Color Palette Menu
c.       Choose Current Color from the Color Palette Menu (Ans)
d.      All of the above

Question: 22
Which of the following is not a Color Adjustment command?
  1. Adjustment command (Ans)
  2. Color Balance command
  3. Selective Color command
  4. Levels command
Question: 23
Which option, when in a checked state, displays a message whenever you open an untagged document?
  1. A
  2. B
  3. C
  4. None of the above (Ans)
Question: 24
You cannot arrange the stacking order of the Auto slices.
  1. True (Ans)
  2. False
Question: 25
You cannot create Work paths from the fonts that do not include the outline data.
  1. True (Ans)
  2. False
Question: 26
Which among the following Methods adds pixels by averaging the color values of the surrounding pixels and produces medium-quality results?
  1. A (Ans)
  2. B
  3. C
  4. D
Question: 27
What do you mean by kerning?
  1. It is the process of adding or subtracting spaces between specific pairs of characters
  2. It is the process of loosening or tightening the spacing between the characters in a selected text or an entire block of text
  3. Both a and b
  4. None of the above
Question: 28
You cannot transform the background layer.
  1. True
  2. False
Question: 29
The mask created by the Replace Color command is permanent.
  1. True
  2. False
Question: 30
What is the colored box in the Navigator Palette known as?
  1. View area
  2. Proxy area
  3. Navigation area (Ans)
  4. Proxy preview area
Question: 31
In which format will you save your document to preserve the Perspective Plane Information in an image while working with the vanishing point, as shown in the given picture?
  1. PSD
  2. TIFF
  3. JPEG
  4. All of the above (Ans)
Question: 32
Which type of images are resolution-dependent?
  1. Bitmap images
  2. Vector images (Ans)
  3. Both a and b
  4. None of the above
Question: 33
Which of the following is not a type of Variable?
  1. Image variables (Ans)
  2. Visibility variables
  3. Pixel Replacement variables
  4. Text Replacement variables
Question: 34
The Rotate Canvas command does not work on which of the following
  1. Individual layers
  2. Paths
  3. Selection borders
  4. All of the above (Ans)
Question: 35
Which of the following Slices is created with the Slice Tool?
  1. Auto slices
  2. User slices (Ans)
  3. Layer-based slices
  4. None of the above
Question: 36
Which option will you select to remove an effect from a style?
  1. In the Layers Palette, drag the Effects Bar to the Delete icon
  2. Choose Layer > Layer style > Clear Layer Style
  3. Select the Layer, and then click the Clear Style button at the bottom of the Styles palette
  4. All of the above (Ans)
Question: 37
Which Command lets you free memory, used by the Undo command, the History Palette, or the Clipboard?
  1. Paths
  2. Place
  3. Purge (Ans)
  4. Place scale marker
Question: 38
Which Animation mode shows the frame duration and keyframed layer properties of the videos and animations in a Timeline?
  1. Timeline (Ans)
  2. Frame
  3. Both a and b
  4. None of the above
Question: 39
Which of the following options displays Temporary Work Path in the Paths palette?
  1. A
  2. B
  3. C
  4. All of the above (Ans)
Question: 40
Which of the following Filters cannot be applied to a Smart Object?
  1. Stylize
  2. Texture
  3. Pattern Maker (Ans)
  4. All of the above
Question: 41
Which of the following is not true about the Curves dialog box?
  1. You can use the Curves dialog box to adjust the entire tonal range of an image
  2. The Curves dialog box lets you adjust up to 14 different points throughout an image's tonal range (Ans)
  3. In the Curves dialog box, the tonal range is represented as a straight diagonal baseline
  4. None of the above
Question: 42
A Motion Picture film has a frame rate of how many fps?
  1. 29.97
  2. 23.976
  3. 25
  4. 24 (Ans)
Question:43
Which file format saves a document of any size as well as preserves all the Photoshop features?
  1. Photoshop Raw
  2. PSD
  3. TIFF
  4. All of the above (Ans)
Question:44
Which of the given file formats works with the Image Processor?
  1. PSD
  2. JPEG
  3. Camera raw files
  4. All of the above (Ans)
Question: 45
Refer to the given image.
Which of the given options displays Converts to Timeline mode in an Animation palette?
  1. A
  2. B (Ans)
  3. C
  4. D
Question: 46
Which of the following Layer properties can be animated?
  1. Position
  2. Opacity
  3. Style
  4. All of the above (Ans)
Question: 47
Which of the given options displays the Modal control in the Actions palette?
  1. A
  2. B
  3. C (Ans)
  4. D
Question:48
Auto Blend Layers is available for which of the following modes?
  1. RGB
  2. Grayscale images
  3. Both a and b
  4. None of the above (Ans)
Question:49
Which among the following files, saved in the Adobe Photoshop format, is used by the filter to create the displacement maps?
  1. Flat file
  2. Bump file
  3. Flattened file
  4. Displace file (Ans)
Question:50
Color Dodge, Color Burn, Lighten, Darken, Difference, and Exclusion blending modes do not work on Lab images.
  1. True (Ans)
  2. False
Question:51
In which of the given instances, a caution icon appears next to the layer comp name as shown in the picture?
  1. When you delete a layer
  2. When you merge a layer
  3. When you convert a layer to a background
  4. All of the above (Ans)
Question:52
Which type of information is not displayed by the Info Palette?
  1. It does not display the opacity of the current layer
  2. It does not display information on the amount of RAM and Scratch Disk used to process the image
  3. It does not display 8-bit, 16-bit, or 32-bit values (Ans)
  4. None of the above
Question:53
Which among the following QuickTime Video formats is supported by Photoshop extended?
  1. MPEG-4
  2. MOV (Ans)
  3. MPEG-1
  4. All of the above
Question:54
Which of the given options displays left indent in the Paragraph palette?
  1. A
  2. B (Ans)
  3. C
  4. D
Question:55
Which option will you select to display a file at 100% size?
  1. Choose View > Actual Pixels
  2. Choose View > Fit on Screen
  3. Choose View > Print Size
  4. All of the above (Ans)
Question:56
By default, Masks applied to Smart objects are linked to Smart object layers.
  1. True (Ans)
  2. False
Question:57
Which among the following Modes does not support layers?
  1. Multichannel
  2. Bitmap
  3. Indexed Color Mode
  4. All of the above (Ans)
Question:58
Why do we select Remember Palette Locations option as shown in the given image?
  1. To display palettes in their last locations on startup (Ans)
  2. To display palettes in their default locations on startup
  3. Both a and b
  4. None of the above
Question:59
Refer to the given image.
Which of the given options displays the Set Tsume option in the Character Palette?
  1. A (Ans)
  2. B
  3. C
  4. D
Question:60
Which among the following is not a Duotone mode type?
  1. Pantone (Ans)
  2. Monotone
  3. Tritone
  4. Quadtone
Question:61
State whether True or False:
Changing units on the Info Palette automatically changes the units on Rulers.
  1. True (Ans)
  2. False
Question:62
Anti-aliasing option is available for which of the given Tools?
  1. Elliptical Marquee tool
  2. Magic Wand tool
  3. Magnetic Lasso tool
  4. All of the above (Ans)

.com.nu তে তৈরী করুন নিজের একটি সাইট একদম ফ্রি-1

আসসালামু আলাইকুম ওয়া রহমাতুল্লাহ ওয়া বারাকাতুহু। সবাইকে নতুন বছরের শুভেচ্ছা জানিয়ে শুরু করছি আমার আজকের এই পোষ্ট। আমরা বিভিন্ন ফ্রি ডোমেইন নিয়ে আমাদের নিজস্ব সাইট তৈরী করি এটা একেবারে সোজা কিন্তু আমরা যে ফ্রি ডোমেইন গুলো পাই তার অধিকাংশই পছন্দনীয় নয়, তাই আজ আমি আপনাদের এমন একটি ডোমেইনের কথা বলব যা সাব-ডোমেইন হলেও দেখতে ফ্রি ডোমেইনের মত মনে হবে না সেটা হল- .com.nu. সমস্ত প্রক্রিয়া টি সম্পন্ন করতে হবে দুই ধাপে-
1। ডোমেইন রেজিস্ট্রেশন
2। ইনডেক্স স্থাপন

এখান থেকে com.nu.