- To prevent the loss of data during power failures, use a(n)_____________?
-
Encryption program
-
Surge protector
-
Firewall
-
UPS
- The scrambling of code is known as___________?
-
Encryption
-
a firewall
-
Scrambling
-
Password proofing
- Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
-
Hacker-proof program
-
Firewall
-
Hacker-resistant server
-
Encryption safe wall
- What is the most common tool used to restrict access to a computer system?
-
User logins
-
Passwords
-
Computer keys
-
Access-control software
- ____________is the measurement of things such as fingerprints and retinal scans used for security access?
-
Biometrics
-
Bio measurement
-
Computer security
-
Smart weapon machinery
- What is the name of an application program that gathers user information and sends it to someone through the Internet?
-
A virus
-
Spybot
-
Logic bomb
-
Security patch
- When a logic bomb is activated by a time-related event, it is known as a____________?
-
Time-related bomb sequence.
-
Virus.
-
Time bomb.
-
Trojan horse.
- The thing that eventually terminates a worm virus is a lack of:
-
Memory or disk space.
-
Time.
-
CD drives space.
-
CD-RW.
- What type of virus uses computer hosts to reproduce itself?
-
Time bomb
-
Worm
-
Melissa virus
-
Macro virus
- In 1999, the Melissa virus was a widely publicised:____________?
-
E-mail virus.
-
Macro virus.
-
Trojan horse.
-
Time bomb.
- An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
-
Trojan horse.
-
Virus.
-
Time bomb.
-
Time-related bomb sequence.
- A program that performs a useful task while simultaneously allowing destructive acts is a___________?
-
Worm.
-
Trojan horse.
-
Virus.
-
Macro virus
- Malicious software is known as____________?
-
Badware.
-
Malware.
-
Maliciousware.
-
Illegalware
- Collecting personal information and effectively posing as another individual is known as the crime of_____________?
-
Spooling.
-
Identity theft.
-
Spoofing.
-
Hacking.
- The common name for the crime of stealing passwords is____________?
-
Jacking.
-
Identity theft.
-
Spoofing.
-
Hacking.
- The typical computer criminal is a(n)____________?
-
Young hacker.
-
Trusted employee with no criminal record.
-
Trusted employee with a long, but unknown criminal record.
-
Overseas young cracker.
- The computer abbreviation KB usually means____________?
-
Key Block
-
Kernel Boot
-
Kilo Byte
-
Kit Bit
- Which of the following is not a storage medium?
-
Hard disk
-
Flash drive
-
DVD
-
scanner
- Large transaction processing systems in automated organisations use___________?
-
Online processing
-
Batch Processing
-
Once-a-day Processing
-
End-of-day processing
- A modem is connected to_____________?
-
a telephone line
-
a keyboard
-
a printer
-
a monitor
- Which of the following contains permanent data and gets updated during the processing of transactions?
-
Operating System File
-
Transaction file
-
Software File
-
Master file
- Which of the following is the smallest storage?
-
Megabyte
-
Gigabyte
-
Terabyte
-
None of these
- Which of the following does not store data permanently?
-
ROM
-
RAM
-
Floppy Disk
-
Hard Disk
- Which of the following is not a binary number?
-
001
-
101
-
202
-
110
- A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?
-
Ancient system
-
Historical system
-
Age old system
-
Legacy system