Question Bank & Answer Key of Fundamental of Computers Part 13
Get unlimited access to the best preparation resource for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.
177. A program that performs a useful task while simultaneously allowing destructive acts is a:
a. Worm.
b. Trojan horse.
c. Virus.
d. Macro virus.
Answer: B
178. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
a. Trojan horse.
b. Virus.
c. Time bomb.
d. Time-related bomb sequence.
Answer: B
179. In 1999, the Melissa virus was a widely publicised:
a. E-mail virus.
b. Macro virus.
c. Trojan horse.
d. Time bomb.
Answer: A
180. What type of virus uses computer hosts to reproduce itself?
a. Time bomb
b. Worm
c. Melissa virus
d. Macro virus
Answer: B
181. The thing that eventually terminates a worm virus is a lack of:
a. Memory or disk space.
b. Time.
c. CD drives space.
d. CD-RW.
Answer: A
182. When a logic bomb is activated by a time-related event, it is known as a:
a. Time-related bomb sequence.
b. Virus.
c. Time bomb.
d. Trojan horse.
Answer: C
183. A logic bomb that was created to erupt on Michelangelo՚s birthday is an example of a:
a. Time-related bomb sequence.
b. Virus.
c. Time bomb.
d. Trojan horse.
Answer: C
184. What is the name of an application program that gathers user information and sends it to someone through the Internet?
a. A virus
b. Spybot
c. Logic bomb
d. Security patch
Answer: B
185 … is the measurement of things such as fingerprints and retinal scans used for security access.
a. Biometrics
b. Bio measurement
c. Computer security
d. Smart weapon machinery
Answer: A
186. What is the most common tool used to restrict access to a computer system?
a. User logins
b. Passwords
b. Computer keys
d. Access-control software
Answer: B
187. Hardware or software designed to guard against unauthorized access to a computer network is known as a (n) :
a. Hacker-proof program.
b. Firewall.
c. Hacker-resistant server.
d. Encryption safe wall.
Answer: B
188. The scrambling of code is known as:
a. Encryption.
b. a firewall.
c. Scrambling.
d. Password proofing.
Answer: A
189. To prevent the loss of data during power failures, use a (n) :
a. Encryption program.
b. Surge protector.
c. Firewall.
d. UPS.
Answer: D
190 … Is defined as any crime completed through the use of computer technology.
a. Computer forensics
b. Computer crime
c. Hacking
d. Cracking
Answer: B