You are on page 1of 5

CLASS TASK

COMPLETE THE QUESTIONS MAKING USE OF YOUR TEXTBOOKS.


NO TALKING ALLOWED.

Multiple Choice a. boot sector


b. file
1. A computer security risk is defined as any
c. Trojan horse
event or action that could cause loss of, or
d. macro
damage to, __________.
a. computer equipment 5. A __________ virus inserts virus code
b. software into program files.
c. data and information a. boot sector
d. all of the above b. file
c. Trojan horse
2. All of the following are true concerning
d. macro
viruses except __________.
a. viruses are potentially damaging 6. A __________ virus hides within or is
computer programs designed to look like a legitimate program.
b. a virus is a segment of a program a. boot sector
c. many viruses are generated by chance b. file
d. damage caused by a virus is called the c. Trojan horse
virus payload d. macro

3. Currently, more than __________ known 7. A __________ virus hides virus code
computer virus programs exist. within an application such as a word
a. 500 processing or a spreadsheet document.
b. 2,000 a. boot sector
c. 6,000 b. file
d. 13,000 c. Trojan horse
d. macro
4. A __________ virus replaces the program
that is used to start the computer system 8. A __________ is a program that is
with a modified, infected version of the activated when a certain condition is
startup program. detected.
Class Task 15 October 2013

a. logic bomb information that enables the computer to


b. worm restart correctly.
c. time bomb a. antivirus
d. macro virus b. rescue
c. fix-it
9. A __________ is a program that is
d. virus fix
enacted on a specific date.
a. logic bomb 14. All of the following are safe computing
b. worm tips to minimize the risk of viruses except
c. time bomb __________.
d. macro virus a. scan all disks
b. scan all downloaded files
10. A well-known time bomb virus is the
c. have and use reliable antivirus software
__________ virus, which destroys files on
d. set your antivirus software for manual
March 6.
scanning
a. da Vinci
b. Michelangelo 15. __________ is the use of a computer
c. Spring Fever system without permission, or computer
d. Green Caterpillar trespassing.
a. Access controls
11. Antivirus programs also are called
b. Unauthorized use
__________.
c. Unauthorized access
a. vaccines
d. Biometic trespass
b. computer medicine
c. virus remedy 16. A person who tries to break into a
d. virus fixers computer system is called a __________.
a. cracker
12. In addition to detecting viruses and
b. hacker
inoculating against them, antivirus
c. cookie
programs can __________.
d. both a and b
a. repair infected programs and files
b. protect against power surges 17. __________ is the use of a computer or
c. protect against unauthorized access data for unapproved or possibly illegal
d. all of the above activities.
a. Access control
13. A(n) __________ disk is a floppy disk
b. Unauthorized use
that contains an uninfected copy of key
c. Unauthorized access
operating system commands and startup
d. Biometic trespass
Class Task 15 October 2013

18. All of the following are tips for creating c. users do not actually own
passwords except __________. d. all of the above
a. join two words together
23. A single-user license typically includes
b. use a relative or your child's name
the following condition __________.
c. choose words from other languages
a. users only may install the software on
d. mix initials and dates together
one computer
19. Hardware theft __________. b. users only may make one backup copy
a. is generally not a problem with larger of the software
computer systems c. users may not give copies to friends
b. can be deterred by using cable locking d. all of the above
devices
24. Software that is distributed free for a trial
c. often can be discouraged by using
use period is called __________.
common sense
a. shareware
d. all of the above
b. freeware
20. Computer vandalism includes all of the c. limited use software
following except __________. d. all of the above
a. a student cutting a computer cable
25. Software that is provided at no cost to a
b. a student deleting important computer
user by an individual or company is called
files
__________.
c. stealing a CD-ROM
a. shareware
d. individuals breaking into a school and
b. freeware
smashing computers
c. limited use software
21. The most common type of software theft d. all of the above
is __________.
26. A __________ license gives the buyer the
a. stealing a CD-ROM
right to install software on multiple
b. stealing a floppy disk
computers at a single site.
c. software piracy
a. community site
d. all of the above
b. network site
22. Software licenses are agreements that c. site
__________. d. single-user
a. provide specific conditions for use of
27. A __________ license allows network
the software
users to share a single copy of the software.
b. users must accept before using the
a. community site
software
b. network site
Class Task 15 October 2013

c. site d. undervoltage
d. single-user
33. A(n) __________ is a prolonged
28. A __________ license gives an entire undervoltage.
region or state the right to install an a. overvoltage
unlimited number of educational copies of a b. blackout
software program. c. brownout
a. community site d. undervoltage
b. network site
34. Surge protectors __________.
c. site
a. smooth out minor voltages
d. single-user
b. provide a stable current flow
29. __________ is the process of converting c. keep overvoltages from damaging
readable data into unreadable characters. computer equipment
a. Ciphertext d. all of the above
b. Plaintext
35. An area of computer ethics frequently
c. Encryption
discussed includes __________.
d. Call back
a. information privacy
30. A(n) __________ occurs when the b. copyright issues
electrical power supply drops. c. software theft
a. overvoltage d. all of the above
b. blackout
36. Employee monitoring uses computers to
c. brownout
observe, record, and review an individual's
d. undervoltage
use of a computer, including __________.
31. A(n) __________ occurs when the a. e-mail
incoming electrical power increases b. keyboard activity
significantly above the normal 120 volts. c. Internet sites visited
a. overvoltage d. all of the above
b. blackout
37. __________ applies to all creative works
c. brownout
and provides certain rights to authors.
d. undervoltage
a. Codes of conduct
32. A(n) __________ is a complete power b. Creative Works Act of 1976
failure. c. Copyright
a. overvoltage d. Computer ethics
b. blackout
38. Copyright laws __________.
c. brownout
Class Task 15 October 2013

a. protect original materials created by


student and teacher posted on the Web
b. apply to all creative works
c. are contained in the Copyright Act of
1976 and its numerous amendments
d. all of the above

39. Fair use guidelines allow __________.


a. individuals to make limited copies of
copyrighted works
b. educators to use certain copyrighted
works for non-profit educational
purposes
c. information on the Web to be copyright
free for teachers
d. all of the above

40. Anything considered __________,


including software or creative works, are
free from copyright restrictions.
a. fair use
b. Web-based
c. public domain
d. all of the above

You might also like