Question Bank & Answer Key of Fundamental of Computers Part 13

Get unlimited access to the best preparation resource for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.

177. A program that performs a useful task while simultaneously allowing destructive acts is a:

a. Worm.

b. Trojan horse.

c. Virus.

d. Macro virus.

Answer: B

178. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

a. Trojan horse.

b. Virus.

c. Time bomb.

d. Time-related bomb sequence.

Answer: B

179. In 1999, the Melissa virus was a widely publicised:

a. E-mail virus.

b. Macro virus.

c. Trojan horse.

d. Time bomb.

Answer: A

180. What type of virus uses computer hosts to reproduce itself?

a. Time bomb

b. Worm

c. Melissa virus

d. Macro virus

Answer: B

181. The thing that eventually terminates a worm virus is a lack of:

a. Memory or disk space.

b. Time.

c. CD drives space.

d. CD-RW.

Answer: A

182. When a logic bomb is activated by a time-related event, it is known as a:

a. Time-related bomb sequence.

b. Virus.

c. Time bomb.

d. Trojan horse.

Answer: C

183. A logic bomb that was created to erupt on Michelangelo՚s birthday is an example of a:

a. Time-related bomb sequence.

b. Virus.

c. Time bomb.

d. Trojan horse.

Answer: C

184. What is the name of an application program that gathers user information and sends it to someone through the Internet?

a. A virus

b. Spybot

c. Logic bomb

d. Security patch

Answer: B

185 … is the measurement of things such as fingerprints and retinal scans used for security access.

a. Biometrics

b. Bio measurement

c. Computer security

d. Smart weapon machinery

Answer: A

186. What is the most common tool used to restrict access to a computer system?

a. User logins

b. Passwords

b. Computer keys

d. Access-control software

Answer: B

187. Hardware or software designed to guard against unauthorized access to a computer network is known as a (n) :

a. Hacker-proof program.

b. Firewall.

c. Hacker-resistant server.

d. Encryption safe wall.

Answer: B

188. The scrambling of code is known as:

a. Encryption.

b. a firewall.

c. Scrambling.

d. Password proofing.

Answer: A

189. To prevent the loss of data during power failures, use a (n) :

a. Encryption program.

b. Surge protector.

c. Firewall.

d. UPS.

Answer: D

190 … Is defined as any crime completed through the use of computer technology.

a. Computer forensics

b. Computer crime

c. Hacking

d. Cracking

Answer: B