Question Bank & Answer Key of Fundamental of Computers Part 13

Glide to success with Doorsteptutor material for IAS : fully solved questions with step-by-step explanation- practice your way to success.

177. A program that performs a useful task while simultaneously allowing destructive acts is a:

a. Worm.

b. Trojan horse.

c. Virus.

d. Macro virus.

Answer : B

178. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

a. Trojan horse.

b. Virus.

c. Time bomb.

d. Time-related bomb sequence.

Answer : B

179. In 1999, the Melissa virus was a widely publicised:

a. E-mail virus.

b. Macro virus.

c. Trojan horse.

d. Time bomb.

Answer : A

180. What type of virus uses computer hosts to reproduce itself?

a. Time bomb

b. Worm

c. Melissa virus

d. Macro virus

Answer : B

181. The thing that eventually terminates a worm virus is a lack of:

a. Memory or disk space.

b. Time.

c. CD drives space.

d. CD-RW.

Answer : A

182. When a logic bomb is activated by a time-related event, it is known as a:

a. Time-related bomb sequence.

b. Virus.

c. Time bomb.

d. Trojan horse.

Answer : C

183. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

a. Time-related bomb sequence.

b. Virus.

c. Time bomb.

d. Trojan horse.

Answer : C

184. What is the name of an application program that gathers user information and sends it to someone through the Internet?

a. A virus

b. Spybot

c. Logic bomb

d. Security patch

Answer : B

185. ------ is the measurement of things such as fingerprints and retinal scans used for security access.

a. Biometrics

b. Bio measurement

c. Computer security

d. Smart weapon machinery

Answer : A

186. What is the most common tool used to restrict access to a computer system?

a. User logins

b. Passwords

b. Computer keys

d. Access-control software

Answer : B

187. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

a. Hacker-proof program.

b. Firewall.

c. Hacker-resistant server.

d. Encryption safe wall.

Answer : B

188. The scrambling of code is known as:

a. Encryption.

b. a firewall.

c. Scrambling.

d. Password proofing.

Answer : A

189. To prevent the loss of data during power failures, use a(n):

a. Encryption program.

b. Surge protector.

c. Firewall.

d. UPS.

Answer : D

190. ------Is defined as any crime completed through the use of computer technology.

a. Computer forensics

b. Computer crime

c. Hacking

d. Cracking

Answer : B