- Cathode Ray Tube is a form of__________?
-
Keyboard
-
Mouse
-
Monitor
-
Mother board
- ____________computer is small general purpose micro computer, but larger than portable computer?
-
Hybrid
-
Digital
-
Desktop
-
Laptop
- _____________computers operates essentially by counting?
-
Portable computer
-
Hybrid computer
-
Analog computer
-
Digital computer
- The first electronic computer was developed by____________?
-
J.V. Attansoff
-
Bill Gates
-
Simur Cray
-
Winton Serf
- ___________refers to electronic trespassing or criminal hacking?
-
Cracking
-
Jacking
-
Spoofing
-
Smarming
- __________is defined as any crime completed through the use of computer technology?
-
Computer forensics
-
Computer crime
-
Hacking
-
Cracking
- To prevent the loss of data during power failures, use a(n)_____________?
-
Encryption program
-
Surge protector
-
Firewall
-
UPS
- The scrambling of code is known as___________?
-
Encryption
-
a firewall
-
Scrambling
-
Password proofing
- Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
-
Hacker-proof program
-
Firewall
-
Hacker-resistant server
-
Encryption safe wall
- What is the most common tool used to restrict access to a computer system?
-
User logins
-
Passwords
-
Computer keys
-
Access-control software
- ____________is the measurement of things such as fingerprints and retinal scans used for security access?
-
Biometrics
-
Bio measurement
-
Computer security
-
Smart weapon machinery
- What is the name of an application program that gathers user information and sends it to someone through the Internet?
-
A virus
-
Spybot
-
Logic bomb
-
Security patch
- When a logic bomb is activated by a time-related event, it is known as a____________?
-
Time-related bomb sequence.
-
Virus.
-
Time bomb.
-
Trojan horse.
- The thing that eventually terminates a worm virus is a lack of:
-
Memory or disk space.
-
Time.
-
CD drives space.
-
CD-RW.
- What type of virus uses computer hosts to reproduce itself?
-
Time bomb
-
Worm
-
Melissa virus
-
Macro virus
- In 1999, the Melissa virus was a widely publicised:____________?
-
E-mail virus.
-
Macro virus.
-
Trojan horse.
-
Time bomb.
- An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
-
Trojan horse.
-
Virus.
-
Time bomb.
-
Time-related bomb sequence.
- A program that performs a useful task while simultaneously allowing destructive acts is a___________?
-
Worm.
-
Trojan horse.
-
Virus.
-
Macro virus
- Malicious software is known as____________?
-
Badware.
-
Malware.
-
Maliciousware.
-
Illegalware
- Collecting personal information and effectively posing as another individual is known as the crime of_____________?
-
Spooling.
-
Identity theft.
-
Spoofing.
-
Hacking.
- The common name for the crime of stealing passwords is____________?
-
Jacking.
-
Identity theft.
-
Spoofing.
-
Hacking.
- The typical computer criminal is a(n)____________?
-
Young hacker.
-
Trusted employee with no criminal record.
-
Trusted employee with a long, but unknown criminal record.
-
Overseas young cracker.
- The computer abbreviation KB usually means____________?
-
Key Block
-
Kernel Boot
-
Kilo Byte
-
Kit Bit
- Which of the following is not a storage medium?
-
Hard disk
-
Flash drive
-
DVD
-
scanner
- Large transaction processing systems in automated organisations use___________?
-
Online processing
-
Batch Processing
-
Once-a-day Processing
-
End-of-day processing