• Cathode Ray Tube is a form of__________?
    1. Keyboard
    2. Mouse
    3. Monitor
    4. Mother board

  • ____________computer is small general purpose micro computer, but larger than portable computer?
    1. Hybrid
    2. Digital
    3. Desktop
    4. Laptop

  • _____________computers operates essentially by counting?
    1. Portable computer
    2. Hybrid computer
    3. Analog computer
    4. Digital computer

  • The first electronic computer was developed by____________?
    1. J.V. Attansoff
    2. Bill Gates
    3. Simur Cray
    4. Winton Serf

  • ___________refers to electronic trespassing or criminal hacking?
    1. Cracking
    2. Jacking
    3. Spoofing
    4. Smarming

  • __________is defined as any crime completed through the use of computer technology?
    1. Computer forensics
    2. Computer crime
    3. Hacking
    4. Cracking

  • To prevent the loss of data during power failures, use a(n)_____________?
    1. Encryption program
    2. Surge protector
    3. Firewall
    4. UPS

  • The scrambling of code is known as___________?
    1. Encryption
    2. a firewall
    3. Scrambling
    4. Password proofing

  • Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
    1. Hacker-proof program
    2. Firewall
    3. Hacker-resistant server
    4. Encryption safe wall

  • What is the most common tool used to restrict access to a computer system?
    1. User logins
    2. Passwords
    3. Computer keys
    4. Access-control software

  • ____________is the measurement of things such as fingerprints and retinal scans used for security access?
    1. Biometrics
    2. Bio measurement
    3. Computer security
    4. Smart weapon machinery

  • What is the name of an application program that gathers user information and sends it to someone through the Internet?
    1. A virus
    2. Spybot
    3. Logic bomb
    4. Security patch

  • When a logic bomb is activated by a time-related event, it is known as a____________?
    1. Time-related bomb sequence.
    2. Virus.
    3. Time bomb.
    4. Trojan horse.

  • The thing that eventually terminates a worm virus is a lack of:
    1. Memory or disk space.
    2. Time.
    3. CD drives space.
    4. CD-RW.

  • What type of virus uses computer hosts to reproduce itself?
    1. Time bomb
    2. Worm
    3. Melissa virus
    4. Macro virus

  • In 1999, the Melissa virus was a widely publicised:____________?
    1. E-mail virus.
    2. Macro virus.
    3. Trojan horse.
    4. Time bomb.

  • An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
    1. Trojan horse.
    2. Virus.
    3. Time bomb.
    4. Time-related bomb sequence.

  • A program that performs a useful task while simultaneously allowing destructive acts is a___________?
    1. Worm.
    2. Trojan horse.
    3. Virus.
    4. Macro virus

  • Malicious software is known as____________?
    1. Badware.
    2. Malware.
    3. Maliciousware.
    4. Illegalware

  • Collecting personal information and effectively posing as another individual is known as the crime of_____________?
    1. Spooling.
    2. Identity theft.
    3. Spoofing.
    4. Hacking.

  • The common name for the crime of stealing passwords is____________?
    1. Jacking.
    2. Identity theft.
    3. Spoofing.
    4. Hacking.

  • The typical computer criminal is a(n)____________?
    1. Young hacker.
    2. Trusted employee with no criminal record.
    3. Trusted employee with a long, but unknown criminal record.
    4. Overseas young cracker.

  • The computer abbreviation KB usually means____________?
    1. Key Block
    2. Kernel Boot
    3. Kilo Byte
    4. Kit Bit

  • Which of the following is not a storage medium?
    1. Hard disk
    2. Flash drive
    3. DVD
    4. scanner

  • Large transaction processing systems in automated organisations use___________?
    1. Online processing
    2. Batch Processing
    3. Once-a-day Processing
    4. End-of-day processing