Long Exam 3 For Itefund X01

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jscansino
J
Jscansino
Community Contributor
Quizzes Created: 2 | Total Attempts: 554
| Attempts: 107
SettingsSettings
Please wait...
  • 1/100 Questions

    In the world of computing, the essential element that controls how computers are used is

    • Ethics
    • Legal laws
    • Security requirements
    • Business demands
Please wait...
About This Quiz

Long Exam 3 for ITEFUND X01 assesses knowledge on web technologies, including internet service providers, domain structures, and web navigation tools. It focuses on understanding OSPs, WSPs, URL analysis, and the functionality of hyperlinks and directories.

Long Exam 3 For Itefund X01 - Quiz

Quiz Preview

  • 2. 

    Which of the following is an example of a strong password?

    • Password

    • J*p2le04>F

    • Your real name, user name, or company name

    • Your birthdate

    Correct Answer
    A. J*p2le04>F
    Explanation
    The given answer "J*p2le04>F" is an example of a strong password because it meets the criteria of being long, containing a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it difficult for hackers to guess or crack the password. It also does not include easily guessable information such as the user's real name, username, company name, or birthdate, which can be easily obtained or guessed by attackers.

    Rate this question:

  • 3. 

    Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

    • Cookies

    • Codes

    • Profiles

    • Trackers

    Correct Answer
    A. Cookies
    Explanation
    Small files that are deposited on a user's hard drive when they visit a website are commonly known as cookies. These cookies are used by websites to store information about the user's preferences, login status, and browsing behavior. They help enhance the user experience by allowing websites to remember user preferences and provide personalized content. Cookies are not codes, profiles, or trackers, but rather specific files that serve a particular purpose in web browsing.

    Rate this question:

  • 4. 

    Collecting personal information and effectively posing as another individual is known as the crime of:

    • Spooling

    • Identity theft

    • Spoofing

    • Hacking

    Correct Answer
    A. Identity theft
    Explanation
    Identity theft refers to the act of collecting personal information and impersonating another individual. This crime involves stealing someone's personal data, such as their name, social security number, or financial information, with the intention of using it for fraudulent purposes. The perpetrator may use the stolen information to open credit accounts, make unauthorized purchases, or commit other fraudulent activities in the victim's name. Identity theft is a serious offense that can cause significant financial and emotional harm to the victim.

    Rate this question:

  • 5. 

    ___ is the measurement of things such as fingerprints and retinal scans used for security access.

    • Biometrics

    • Biomeasurement

    • Computer Security

    • Smart weapon machinery

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics refers to the measurement of unique physical characteristics, such as fingerprints and retinal scans, used for security access. This technology relies on the fact that these biometric traits are distinctive to each individual, making it difficult for unauthorized users to gain access. Biometrics offers a more secure and reliable method of authentication compared to traditional methods like passwords or ID cards, as it is difficult to replicate or forge someone's biometric features. Therefore, the correct answer is Biometrics.

    Rate this question:

  • 6. 

    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

    • Annoyance

    • Worm

    • Attack

    • Scam

    Correct Answer
    A. Scam
    Explanation
    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams are often carried out through various means such as phone calls, emails, or online advertisements, where the scammer poses as a legitimate entity or offers false promises to deceive and exploit victims. The intention is to defraud individuals and take advantage of their trust or vulnerability for personal gain.

    Rate this question:

  • 7. 

    Which of the following is an example of a strong password?

    • Password

    • J*p2le04>F

    • Your real name, user name, or company name

    • Your birthdate

    Correct Answer
    A. J*p2le04>F
    Explanation
    The password "J*p2le04>F" is an example of a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it difficult for hackers to guess or crack the password, increasing the security of the account or system it is used for.

    Rate this question:

  • 8. 

    When you want to transfer files between computers, the best Internet service to use is

    • Instant Messaging

    • FTP

    • Chat

    • Usenet

    Correct Answer
    A. FTP
    Explanation
    FTP (File Transfer Protocol) is the best Internet service to use when transferring files between computers. Instant Messaging, Chat, and Usenet are not specifically designed for file transfers and may not provide the necessary features or security for efficient and reliable file transfers. FTP, on the other hand, is specifically designed for this purpose, allowing users to easily upload and download files between computers over the Internet. It provides a reliable and secure method for transferring large files or multiple files at once.

    Rate this question:

  • 9. 

    Small files that are deposited on a user’s hard drive when they visit a Web site are best described as

    • Cookies

    • Codes

    • Profiles

    • Trackers

    Correct Answer
    A. Cookies
    Explanation
    Small files that are deposited on a user's hard drive when they visit a Web site are commonly known as cookies. These cookies are used by websites to store information about the user's preferences, browsing history, and other relevant data. They help in providing a personalized and efficient browsing experience by remembering user preferences and allowing websites to tailor their content accordingly. Cookies are widely used in the online world to enhance user experience and provide personalized services.

    Rate this question:

  • 10. 

    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a

    • Annoyance

    • Worm

    • Attack

    • Scam

    Correct Answer
    A. Scam
    Explanation
    A fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return is called a scam. Scams can take various forms, such as online schemes, phone calls, or in-person interactions, and they aim to deceive people into giving away their personal information or making financial transactions under false pretenses. Scammers often prey on people's trust and vulnerability, promising unrealistic rewards or benefits in exchange for their participation. It is important to be cautious and skeptical of any offers or requests that seem too good to be true to avoid falling victim to a scam.

    Rate this question:

  • 11. 

    When you want to transfer files between computers, the best Internet service to use is

    • Instant Messaging

    • FTP

    • Chat

    • Usenet

    Correct Answer
    A. FTP
    Explanation
    FTP (File Transfer Protocol) is the best Internet service to use when you want to transfer files between computers. Instant Messaging, Chat, and Usenet are not specifically designed for file transfer, whereas FTP is specifically designed for transferring files over a network. It provides a reliable and efficient method for transferring files, allowing users to upload and download files between different computers.

    Rate this question:

  • 12. 

    Collecting personal information and effectively posing as another individual is known as the crime of:

    • Spooling

    • Identity theft

    • Spoofing

    • Hacking

    Correct Answer
    A. Identity theft
    Explanation
    Identity theft refers to the act of collecting personal information and effectively posing as another individual. It involves stealing someone's personal data, such as their Social Security number or credit card information, and using it for fraudulent purposes. This crime can lead to financial loss, damage to reputation, and other serious consequences for the victim.

    Rate this question:

  • 13. 

    ___ is the measurement of things such as fingerprints and retinal scans used for security access.

    • Biometrics

    • Biomeasurement

    • Computer Security

    • Smart weapon machinery

    Correct Answer
    A. Biometrics
    Explanation
    Biometrics refers to the measurement of unique physical characteristics such as fingerprints and retinal scans, which are commonly used for security access. This technology relies on the fact that these biometric features are distinctive to each individual, making them an effective method for verifying and granting access to secure areas or systems. Unlike the other options, biometrics specifically focuses on the use of these measurements for security purposes, making it the correct answer.

    Rate this question:

  • 14. 

    Most computer systems rely solely on ___________ for authentication.

    • Logins

    • Passwords

    • Encryption

    • Lock and key

    Correct Answer
    A. Passwords
    Explanation
    Passwords are commonly used in computer systems as a means of authentication. Users are required to enter a unique password that matches the one stored in the system in order to gain access. This method provides a level of security by ensuring that only authorized individuals can log in to the system. While other authentication methods such as encryption and lock and key may also be used in certain cases, passwords are the most commonly relied upon method for authentication in computer systems.

    Rate this question:

  • 15. 

    In the world of computing, the essential element that controls how computers are used is

    • Ethics

    • Legal laws

    • Security requirements

    • Business demands

    Correct Answer
    A. Ethics
    Explanation
    Ethics is the correct answer because it refers to the moral principles and values that govern the behavior of individuals and organizations in the computing world. Ethical considerations are crucial in determining how computers are used, as they guide decisions regarding privacy, data protection, intellectual property rights, and fair use of technology. Adhering to ethical standards ensures responsible and accountable use of computers, promoting trust and integrity in the computing industry.

    Rate this question:

  • 16. 

    The guidelines for the morally acceptable use of computers in society are

    • Computer ethics

    • Privacy

    • Morality

    • Legal systems

    Correct Answer
    A. Computer ethics
    Explanation
    Computer ethics refers to the principles and guidelines that govern the morally acceptable use of computers in society. It involves understanding and applying ethical principles to issues such as privacy, intellectual property rights, and the appropriate use of technology. Computer ethics helps individuals and organizations make informed decisions about their actions and behaviors in the digital world. It also promotes responsible and ethical behavior in the development, use, and management of computer systems and technology.

    Rate this question:

  • 17. 

    The guidelines for the morally acceptable use of computers in society are

    • Computer ethics

    • Privacy

    • Morality

    • Legal systems

    Correct Answer
    A. Computer ethics
    Explanation
    Computer ethics refers to the guidelines and principles that govern the morally acceptable use of computers in society. It involves considering the ethical implications of using computers and technology, such as issues related to privacy, security, intellectual property, and the impact on individuals and society as a whole. Computer ethics helps individuals and organizations make informed decisions about the responsible and ethical use of technology, ensuring that they adhere to moral standards and legal requirements while utilizing computer systems and resources.

    Rate this question:

  • 18. 

    A built-in connection to another related Web page or part of a Web page is called a ____.

    • Browser

    • Hit

    • Hyperlink

    • Jump

    Correct Answer
    A. Hyperlink
    Explanation
    A built-in connection to another related Web page or part of a Web page is called a hyperlink. This is a commonly used term in web development and refers to a clickable element that allows users to navigate between different web pages or sections within a web page. Hyperlinks are an essential feature of the web as they enable easy and intuitive navigation, allowing users to access different information or resources with just a click.

    Rate this question:

  • 19. 

    What type of virus uses computer hosts to reproduce itself?

    • Time bomb

    • Worm

    • Melissa Virus (I LOVE YOU VIRUS)

    • Macro virus

    Correct Answer
    A. Worm
    Explanation
    A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, a worm does not require a host program to spread, as it can independently replicate and spread across networks. Worms often exploit security vulnerabilities to infect systems, and once inside, they can consume system resources, slow down networks, and even cause damage or steal sensitive information. Therefore, the correct answer to the question is a worm.

    Rate this question:

  • 20. 

    The scrambling of code is known as:

    • Encryption

    • A firewall

    • Scrambling

    • Password-proofing

    Correct Answer
    A. Encryption
    Explanation
    Encryption refers to the process of converting data into a form that is unreadable by unauthorized users. It involves using algorithms to scramble the code or data in such a way that it can only be accessed and understood by individuals with the appropriate decryption key. This ensures the confidentiality and security of the information being transmitted or stored. Therefore, encryption is the correct answer as it accurately describes the process of scrambling code to protect it from unauthorized access.

    Rate this question:

  • 21. 

    A __________ acts as a security buffer between a company’s private network and all external networks.

    • Firewall

    • Passwords

    • Disaster recovery plan

    • Virus checker

    Correct Answer
    A. Firewall
    Explanation
    A firewall is a security measure that acts as a barrier between a company's private network and external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. By doing so, it helps protect the private network from unauthorized access, viruses, malware, and other potential threats from the outside world. Firewalls are essential for maintaining the security and integrity of a company's network infrastructure.

    Rate this question:

  • 22. 

    The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.

    • Http://

    • Www.scsite.com/

    • Dc2002/

    • Ch2

    Correct Answer
    A. Www.scsite.com/
    Explanation
    The domain name in the given URL is "www.scsite.com". This is because the domain name is the part of the URL that identifies the website or web address. In this case, "www.scsite.com" is the domain name followed by the specific page or directory "dc2003/ch2".

    Rate this question:

  • 23. 

    A built-in connection to another related Web page or part of a Web page is called a ____.

    • Browser

    • Hit

    • Hyperlink

    • Jump

    Correct Answer
    A. Hyperlink
    Explanation
    A built-in connection to another related Web page or part of a Web page is called a hyperlink. A hyperlink is a clickable element on a webpage that allows users to navigate to another webpage or a specific section within the same webpage. It is commonly represented by highlighted text or an image that, when clicked, redirects the user to the linked content.

    Rate this question:

  • 24. 

    What type of virus uses computer hosts to reproduce itself?

    • Time bomb

    • Worm

    • Melissa Virus (I LOVE YOU VIRUS)

    • Macro virus

    Correct Answer
    A. Worm
    Explanation
    A worm is a type of virus that uses computer hosts to reproduce itself. Unlike other viruses, worms can spread without any human intervention and can replicate themselves across networks, causing damage to computer systems. They can exploit vulnerabilities in operating systems or software to gain access to a host and then use that host to propagate to other computers. Worms are known for their ability to rapidly spread and infect large numbers of computers, making them a significant threat to cybersecurity. The other options listed, such as time bomb, Melissa Virus, and macro virus, are not specifically known for using computer hosts to reproduce themselves.

    Rate this question:

  • 25. 

    What is the name of an application program that gathers user information and sends it to someone through the Internet?

    • A Virus

    • Spybot

    • Logic Bomb

    • Security patch

    Correct Answer
    A. Spybot
    Explanation
    A spybot is an application program that gathers user information and sends it to someone through the Internet. It is designed to secretly collect data such as personal information, browsing habits, and passwords without the user's knowledge or consent. This information can then be used for malicious purposes, such as identity theft or targeted advertising. Spybots are a type of malware and are often used by hackers or cybercriminals to gain unauthorized access to sensitive information.

    Rate this question:

  • 26. 

    The scrambling of code is known as:

    • Encryption

    • A firewall

    • Scrambling

    • Password-proofing

    Correct Answer
    A. Encryption
    Explanation
    Encryption refers to the process of converting plaintext into ciphertext, making it unreadable to unauthorized parties. It involves the use of algorithms and keys to scramble the code, ensuring that only authorized individuals with the correct decryption key can access the information. Therefore, encryption is the correct term for the scrambling of code.

    Rate this question:

  • 27. 

    When a hard disk crashes, it is an example of a __________ type of computer security threat.

    • Natural hazard

    • Criminal

    • Technological failure

    • Civil strife

    Correct Answer
    A. Technological failure
    Explanation
    When a hard disk crashes, it is considered a technological failure. This type of computer security threat refers to any failure or malfunction in computer hardware or software that can result in the loss of data or the inability to access or use the computer system. In the case of a hard disk crash, it means that the physical or logical components of the hard disk have stopped functioning properly, leading to potential data loss or system failure.

    Rate this question:

  • 28. 

    The domain name in the URL http://www.scsite.com/dc2003/ch2 is ____.

    • Http://

    • Www.scsite.com/

    • Dc2002/

    • Ch2

    Correct Answer
    A. Www.scsite.com/
    Explanation
    The domain name in the given URL is "www.scsite.com". It is the part of the URL that identifies the specific website or web page that the user wants to access. In this case, "www.scsite.com" is the domain name, and it is followed by additional path information ("/dc2003/ch2") that specifies the specific location or page within the website.

    Rate this question:

  • 29. 

    What is the name of an application program that gathers user information and sends it to someone through the Internet?

    • A Virus

    • Spybot

    • Logic Bomb

    • Security patch

    Correct Answer
    A. Spybot
    Explanation
    A spybot is an application program that gathers user information and sends it to someone through the Internet. It is designed to secretly collect personal data without the user's knowledge or consent. Unlike a virus, which is a malicious program that can replicate itself and cause harm to a computer system, a spybot focuses on stealing information. A logic bomb is a type of malicious code that is triggered by a specific event or condition, while a security patch is a software update that fixes vulnerabilities in a program or system.

    Rate this question:

  • 30. 

    _____ is defined as any crime completed through the use of computer technology.

    • Computer forensics

    • Computer Crimes

    • Hacking

    • Cracking

    Correct Answer
    A. Computer Crimes
    Explanation
    Computer Crimes is the correct answer because it encompasses any criminal activity that is carried out using computer technology. This includes a wide range of offenses such as hacking, identity theft, fraud, and cyberbullying. Computer Crimes can have serious consequences and require specialized knowledge and techniques in order to investigate and prosecute.

    Rate this question:

  • 31. 

    Which of the following would best fit the following description – software is copied and given to a friend without the permission of the owner?

    • Freeware

    • Piracy

    • Shareware

    • Public domain

    Correct Answer
    A. Piracy
    Explanation
    Piracy best fits the description because it involves the unauthorized copying and distribution of software without the owner's permission. This act is considered illegal and unethical as it infringes upon the intellectual property rights of the software owner. Freeware refers to software that is available for free, shareware refers to software that can be shared and evaluated before purchasing, and public domain refers to software that is not protected by copyright and can be freely used by anyone.

    Rate this question:

  • 32. 

    The ethical issue concerned with the correctness of data collected is

    • Access

    • Property

    • Exactness

    • Privacy

    Correct Answer
    A. Exactness
    Explanation
    The ethical issue concerned with the correctness of data collected is "exactness". This means that when collecting data, it is important to ensure that the information is accurate, reliable, and free from errors or biases. This ethical issue emphasizes the importance of maintaining the integrity of data and avoiding any manipulation or misrepresentation of information. It highlights the responsibility of data collectors to gather and report data accurately, ensuring that it reflects the true and factual state of affairs.

    Rate this question:

  • 33. 

    When a hard disk crashes, it is an example of a __________ type of computer security threat.

    • Natural hazard

    • Criminal

    • Technological failure

    • Civil strife

    Correct Answer
    A. Technological failure
    Explanation
    When a hard disk crashes, it is considered a technological failure. This means that the failure is caused by a malfunction or breakdown in the technology itself, rather than being the result of criminal activity, civil strife, or a natural hazard. Technological failures can occur due to various reasons such as hardware malfunctions, software errors, or power outages, and they can lead to data loss or system downtime. In the case of a hard disk crash, it typically means that the disk is no longer functioning properly and may need to be replaced or repaired.

    Rate this question:

  • 34. 

    The ethical issue that involves who is able to read and use data is

    • Access

    • Property

    • Accuracy

    • Privacy

    Correct Answer
    A. Access
    Explanation
    The ethical issue that involves who is able to read and use data is access. This refers to the question of who has the right or permission to access and utilize certain data. It raises concerns about fairness, transparency, and potential misuse of information. Access to data should be regulated and controlled to ensure privacy, protect sensitive information, and prevent unauthorized use or exploitation.

    Rate this question:

  • 35. 

    Programs that come into a computer system disguised as something else are called

    •   spoofers

    • Loggers

    • Defacers

    • Trojan Horse

    Correct Answer
    A. Trojan Horse
    Explanation
    A Trojan Horse is a type of program that disguises itself as something harmless or desirable, but once installed, it performs malicious actions on the computer system. Unlike spoofers, loggers, and defacers, which have their own specific purposes, a Trojan Horse is specifically designed to deceive users and gain unauthorized access or cause damage to the system. Therefore, the correct answer is Trojan Horse.

    Rate this question:

  • 36. 

    A program that performs a useful task while simultaneously allowing destructive acts is a:

    • Worm

    • Trojan Horse

    • Virus

    • Macro virus

    Correct Answer
    A. Trojan Horse
    Explanation
    A Trojan Horse is a type of malicious software that appears to be legitimate or useful, but actually contains harmful code. It tricks users into downloading or executing it, thereby allowing the attacker to gain unauthorized access to the system or perform destructive acts. Unlike a worm or a virus, a Trojan Horse does not replicate itself but relies on social engineering techniques to deceive users. Therefore, a program that performs a useful task while allowing destructive acts is classified as a Trojan Horse.

    Rate this question:

  • 37. 

    An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

    • Trojan horse

    • Virus

    • Time-bomb

    • Malware

    Correct Answer
    A. Virus
    Explanation
    A virus is a type of intentionally disruptive program that is designed to spread from program to program or from disk to disk. It can infect and harm computer systems by modifying or deleting files, stealing personal information, or causing other types of damage. Unlike a Trojan horse, which disguises itself as a harmless program, a virus actively replicates and spreads itself. A time-bomb is a type of malware that is programmed to activate at a specific time or date, causing harm to the system. While malware is a general term for any malicious software, a virus specifically refers to a self-replicating program.

    Rate this question:

  • 38. 

    When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

    • Viruses

    • Trojan Horse

    • Cracking

    • A denial of service attack

    Correct Answer
    A. A denial of service attack
    Explanation
    A denial of service attack refers to a situation where a website becomes unavailable to its customers due to an overwhelming amount of fake traffic. This can be caused by hackers or malicious individuals who flood the website with an excessive number of requests, making it unable to handle legitimate user traffic. Unlike viruses or Trojan horses which are typically designed to infect and compromise a system, a denial of service attack aims to disrupt the availability of a website by overwhelming its resources.

    Rate this question:

  • 39. 

    When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

    • Viruses

    • Trojan Horse

    • Cracking

    • A denial of service attack

    Correct Answer
    A. A denial of service attack
    Explanation
    A denial of service attack refers to the situation when a website becomes unavailable to its legitimate users due to an overwhelming amount of fake traffic. This fake traffic can be generated by multiple sources simultaneously, making it impossible for the website to handle the load and causing it to crash or become extremely slow. This type of attack is often carried out by hackers or malicious individuals with the intention of disrupting the normal functioning of a website or online service.

    Rate this question:

  • 40. 

    What is the most common tool used to restrict access to a computer system?

    • User logins

    • Passwords

    • Computer keys

    • Access-control Software

    Correct Answer
    A. Passwords
    Explanation
    Passwords are the most common tool used to restrict access to a computer system. They provide a layer of security by requiring users to enter a unique combination of characters, known only to them, to gain access. Passwords can be set up for individual user accounts, ensuring that only authorized individuals can log in and access the system. They are widely used due to their simplicity and effectiveness in protecting sensitive information from unauthorized access.

    Rate this question:

  • 41. 

    Most computer systems rely solely on ___________ for authentication.

    • Logins

    • Passwords

    • Encryption

    • Lock and key

    Correct Answer
    A. Passwords
    Explanation
    Computer systems typically rely on passwords for authentication. Passwords are a common method of verifying the identity of a user and granting access to a system. They provide a level of security by requiring users to enter a unique combination of characters that only they should know. This helps to prevent unauthorized access and protect sensitive information. While other authentication methods like logins, encryption, and lock and key may be used in certain systems, passwords are the most widely used and recognized form of authentication in computer systems.

    Rate this question:

  • 42. 

    A __________ acts as a security buffer between a company’s private network and all external networks.

    • Firewall

    • Passwords

    • Disaster recovery plan

    • Virus checker

    Correct Answer
    A. Firewall
    Explanation
    A firewall acts as a security buffer between a company's private network and all external networks. It monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, malicious attacks, and data breaches by filtering and blocking potentially harmful traffic. Firewalls can also provide additional security features such as intrusion detection and prevention systems, virtual private network (VPN) support, and network address translation (NAT).

    Rate this question:

  • 43. 

    The study of fitting computers to people is called __________.

    • Macro building

    • Kinesthenics

    • Ergonomics

    • Chiropractic

    Correct Answer
    A. Ergonomics
    Explanation
    Ergonomics is the study of fitting computers to people. It focuses on designing and arranging computer systems, furniture, and equipment in a way that maximizes efficiency and minimizes discomfort or injury for the user. It involves considering factors such as the user's posture, body mechanics, and workspace layout to create a safe and comfortable environment for computer use.

    Rate this question:

  • 44. 

    Creating strong computer security to prevent computer crime usually simultaneously helps protect :

    • Privacy rights

    • Personal ethics

    • The number of cookies downloaded to your personal computer

    • Personal space

    Correct Answer
    A. Privacy rights
    Explanation
    Creating strong computer security measures helps protect privacy rights by safeguarding personal information from unauthorized access or theft. Strong security measures such as encryption, firewalls, and secure authentication protocols can prevent hackers or cybercriminals from gaining access to sensitive data, ensuring that individuals' privacy is maintained. By implementing these measures, individuals can have more control over their personal information and reduce the risk of privacy breaches or identity theft.

    Rate this question:

  • 45. 

    A program that migrates through networks and operating systems and attaches itself to different programs and databases is a __________.

    • Viruses

    • Worms

    • Denial-of-service attack

    • Damage

    Correct Answer
    A. Viruses
    Explanation
    A program that migrates through networks and operating systems and attaches itself to different programs and databases is referred to as a virus. Viruses are malicious software that can replicate and spread themselves by attaching to other files or programs. They can cause harm by corrupting or deleting data, disrupting system functionality, or stealing sensitive information. Unlike worms, which can self-replicate and spread without attaching to other files, viruses rely on host files to propagate. Denial-of-service attacks, on the other hand, aim to overwhelm a system or network with excessive traffic, while "damage" is a broad term that does not specifically describe the behavior of the program mentioned.

    Rate this question:

  • 46. 

    A program that fills a computer system with self-replicating information thus clogging the system is called a __________.

    • Viruses

    • Worms

    • Denial-of-service attack

    • Damage

    Correct Answer
    A. Worms
    Explanation
    A program that fills a computer system with self-replicating information thus clogging the system is called worms. Unlike viruses, worms do not need to attach to an existing program or file to spread. They can independently replicate and spread across a network, consuming system resources and causing disruptions. Denial-of-service attacks aim to overwhelm a system with excessive traffic, while damage refers to the harm caused by malicious activities.

    Rate this question:

  • 47. 

    Programs that come into a computer system disguised as something else are called

    •   spoofers

    • loggers

    • Defacers

    • Trojan Horse

    Correct Answer
    A. Trojan Horse
    Explanation
    A Trojan Horse is a type of malicious program that disguises itself as something else in order to gain access to a computer system. It tricks users into thinking it is a legitimate program or file, but once installed, it can perform harmful actions such as stealing personal information, damaging files, or allowing unauthorized access to the system. Unlike spoofers, loggers, and defacers which may have different objectives, a Trojan Horse specifically focuses on deception and unauthorized access.

    Rate this question:

  • 48. 

    An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

    • Trojan horse

    • Virus

    • Time-bomb

    • Malware

    Correct Answer
    A. Virus
    Explanation
    A virus is a type of malicious software that is designed to replicate itself and spread from one program or disk to another. It can cause damage to computer systems by corrupting files, stealing personal information, or causing system crashes. Unlike a Trojan horse, which disguises itself as a harmless program, a virus is self-replicating and can spread without the user's knowledge or consent. Therefore, the correct answer is virus.

    Rate this question:

  • 49. 

    _____ is defined as any crime completed through the use of computer technology.

    • Computer forensics

    • Computer Crimes

    • Hacking

    • Cracking

    Correct Answer
    A. Computer Crimes
    Explanation
    Computer Crimes is the correct answer because it encompasses any criminal activity that is carried out using computer technology. This includes a wide range of offenses such as hacking, identity theft, fraud, and cyberbullying. Computer Crimes are becoming increasingly prevalent in today's digital age, posing significant threats to individuals, organizations, and even governments. Law enforcement agencies and computer forensic experts play a crucial role in investigating and preventing these crimes, as well as gathering evidence to prosecute offenders.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 29, 2014
    Quiz Created by
    Jscansino
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.