Home / Computer Fundamentals / Computer Fundamental Miscellaneous :: section-5

Computer Fundamentals :: Computer Fundamental Miscellaneous

  1. What is the name of an application program that gathers user information and sends it to someone through the Internet?

  2. A.

     A virus

    B.

     Spybot

    C.

     Logic bomb

    D.

     Security patch

    View Answer

    Workspace

    Discuss Discuss in Forum


  3. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:

  4. A.

     More complicated

    B.

     More difficult

    C.

     Easier

    D.

     Slower

    View Answer

    Workspace

    Discuss Discuss in Forum


  5. HTML viruses infect:

  6. A.

     Your computer

    B.

     A Web page in the HTML code

    C.

     Both a Web page and the computer that is viewing it.

    D.

     None of these

    View Answer

    Workspace

    Discuss Discuss in Forum


  7. Software programs that close potential security breaches in an operating system are known as:

  8. A.

     Security breach fixes

    B.

     Refresh patches

    C.

     Security repairs

    D.

     Security patches

    View Answer

    Workspace

    Discuss Discuss in Forum


  9. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

  10. A.

     A virus

    B.

     A Trojan Horse

    C.

     Cracking

    D.

     A denial of service attack.

    View Answer

    Workspace

    Discuss Discuss in Forum


  11. __________ is the measurement of things such as fingerprints and retinal scans used for security access.

  12. A.

     Biometrics

    B.

     Biomeasurement

    C.

     Computer security

    D.

     Smart weapon machinery

    View Answer

    Workspace

    Discuss Discuss in Forum


  13. What is the most common tool used to restrict access to a computer system?

  14. A.

     User log in

    B.

     Passwords

    C.

     Computer keys

    D.

     Access-control software

    View Answer

    Workspace

    Discuss Discuss in Forum


  15. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

  16. A.

     Hacker-proof program

    B.

     Firewall

    C.

     Hacker-resistant server

    D.

     Encryption safe wall

    View Answer

    Workspace

    Discuss Discuss in Forum


  17. The scrambling of code is known as:

  18. A.

     Encryption

    B.

     A firewall

    C.

     Scrambling

    D.

     Password-proofing

    View Answer

    Workspace

    Discuss Discuss in Forum


  19. If you want to secure a message, use a(n):

  20. A.

     Cryptology source

    B.

     Encryption key

    C.

     Encryption software package

    D.

     Cryptosystem

    View Answer

    Workspace

    Discuss Discuss in Forum