Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Chapter 5

1. The broad term that encompasses different harmful software is:


 Virus
 Malware
 Adware
 Spyware n
2. The authentication mechanism that only allows the real person to access data or device is:
 Username and Password
 Biometric
 PIN
 Scan Code
3. Software’s are mostly protected under:
 Patents
 Trademarks
 Copyrights
 Logos
4. The professional ethics in computer field is important because
 Itis necessary by law.
 Violation can cause serious penalties.
 Itis useful for financial benefits.
 It creates healthy and positive work environment.
5. Free Antivirus Software often
 Expire after sometimes
 Offer only limited service
 Cannot be purchased
 Cannot be updated
6. 6.Copying and pasting some texts from internet without acknowledging the real author is an
example of:
 Illegal use of patent
 Information Piracy
 Copyright Violation
 Plagiarism
7. Since it does not harm or steal data, the least harmful malware is:
 Trojan
 Spyware
 Adware
 Virus
8. The malware that replicates itself and doesn't need to attach with any files is:
 Worm
 Spyware
 Adware
 Virus
9. Through which virus spreads
 Flash Disks and CDs
 All of them
 Email Attachments
 Internet Downloads
10. Click this link and win $5 voucher at McDonald’s”. This is an example of:
a) scam
b) phishing
c) clickjacking
d) hacking
11. Which of the following program we used to clean our PC from virus?
 Firefox
 PowerPoint
 Word
 Norton
12. Which software monitors user activity on internet and transmit that information in the
background to someone else?
 Adware
 Ransomware
 Spyware
 Malware
13. Firewall is a type of.
 Virus
 Word
 Security Guard
 Security threat
14. Most devastating loss to a company is:
 Loss of hardware
 Loss of software
 Loss of data
 Loss of printouts
15. Using pop-up windows to get a user to give out information is which type of social engineering
attack
 Human-based
 Computer-based
 Nontechnical
 Coercive
16. Which is populating the inbox of any target victim with unsolicited or junk emails?
 Spamming
 Phishing
 Hooking
 DDoS
17. Computer Viruses are:
 Naturally occur
 Machine made
 Man made
 By itself
18. Unwanted commercial email is known as.
 Malware
 Spyware
 Virus
 Spam
19. Secret words or numbers used for protection of devices is called
 biometrics data
 Backup
 Passwords
 Private words
20. Which statement describes "Hackers"?
 Break into other people's computers
 All have the same motive
 May legally break into computers as long as they do not do any damage
 are people who are allergic to computers

You might also like