• To prevent the loss of data during power failures, use a(n)_____________?
    1. Encryption program
    2. Surge protector
    3. Firewall
    4. UPS

  • The scrambling of code is known as___________?
    1. Encryption
    2. a firewall
    3. Scrambling
    4. Password proofing

  • Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
    1. Hacker-proof program
    2. Firewall
    3. Hacker-resistant server
    4. Encryption safe wall

  • What is the most common tool used to restrict access to a computer system?
    1. User logins
    2. Passwords
    3. Computer keys
    4. Access-control software

  • ____________is the measurement of things such as fingerprints and retinal scans used for security access?
    1. Biometrics
    2. Bio measurement
    3. Computer security
    4. Smart weapon machinery

  • What is the name of an application program that gathers user information and sends it to someone through the Internet?
    1. A virus
    2. Spybot
    3. Logic bomb
    4. Security patch

  • When a logic bomb is activated by a time-related event, it is known as a____________?
    1. Time-related bomb sequence.
    2. Virus.
    3. Time bomb.
    4. Trojan horse.

  • The thing that eventually terminates a worm virus is a lack of:
    1. Memory or disk space.
    2. Time.
    3. CD drives space.
    4. CD-RW.

  • What type of virus uses computer hosts to reproduce itself?
    1. Time bomb
    2. Worm
    3. Melissa virus
    4. Macro virus

  • In 1999, the Melissa virus was a widely publicised:____________?
    1. E-mail virus.
    2. Macro virus.
    3. Trojan horse.
    4. Time bomb.

  • An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
    1. Trojan horse.
    2. Virus.
    3. Time bomb.
    4. Time-related bomb sequence.

  • A program that performs a useful task while simultaneously allowing destructive acts is a___________?
    1. Worm.
    2. Trojan horse.
    3. Virus.
    4. Macro virus

  • Malicious software is known as____________?
    1. Badware.
    2. Malware.
    3. Maliciousware.
    4. Illegalware

  • Collecting personal information and effectively posing as another individual is known as the crime of_____________?
    1. Spooling.
    2. Identity theft.
    3. Spoofing.
    4. Hacking.

  • The common name for the crime of stealing passwords is____________?
    1. Jacking.
    2. Identity theft.
    3. Spoofing.
    4. Hacking.

  • The typical computer criminal is a(n)____________?
    1. Young hacker.
    2. Trusted employee with no criminal record.
    3. Trusted employee with a long, but unknown criminal record.
    4. Overseas young cracker.

  • The computer abbreviation KB usually means____________?
    1. Key Block
    2. Kernel Boot
    3. Kilo Byte
    4. Kit Bit

  • Which of the following is not a storage medium?
    1. Hard disk
    2. Flash drive
    3. DVD
    4. scanner

  • Large transaction processing systems in automated organisations use___________?
    1. Online processing
    2. Batch Processing
    3. Once-a-day Processing
    4. End-of-day processing

  • A modem is connected to_____________?
    1. a telephone line
    2. a keyboard
    3. a printer
    4. a monitor

  • Which of the following contains permanent data and gets updated during the processing of transactions?
    1. Operating System File
    2. Transaction file
    3. Software File
    4. Master file

  • Which of the following is the smallest storage?
    1. Megabyte
    2. Gigabyte
    3. Terabyte
    4. None of these

  • Which of the following does not store data permanently?
    1. ROM
    2. RAM
    3. Floppy Disk
    4. Hard Disk

  • Which of the following is not a binary number?
    1. 001
    2. 101
    3. 202
    4. 110

  • A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?
    1. Ancient system
    2. Historical system
    3. Age old system
    4. Legacy system