Find Test Answers





PREV 1 2 3 4 5 6 7 8 NEXT

A virus signature is a portion of virus code that is unique to a particular computer virus.


A) TRUE

B) FALSE

 



Answer: A

Computer - Computer Literacy 101 - Chapter 9

Instant messaging programs are susceptible to virus attacks.


A) TRUE

B) FALSE

 



Answer: A

Computer - Computer Literacy 101 - Chapter 9

The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive.


A) TRUE

B) FALSE

 



Answer: B

Computer - Computer Literacy 101 - Chapter 9

Wireless networks are no more vulnerable to packet sniffers than are wired networks.


A) TRUE

B) FALSE

 



Answer: B

Computer - Computer Literacy 101 - Chapter 9

Many photocopiers have hard drives just as computers do which makes them a potential target for identity thieves.


A) TRUE

B) FALSE

 



Answer: A

Computer - Computer Literacy 101 - Chapter 9

Photocopiers do not present any vulnerability for potential hackers.


A) TRUE

B) FALSE

 



Answer: B

Computer - Computer Literacy 101 - Chapter 9

A zombie is another person's computer controlled by a hacker.


A) TRUE

B) FALSE

 



Answer: A

Computer - Computer Literacy 101 - Chapter 9

A person with malicious intent can take complete control of your computer by using a backdoor program.


A) TRUE

B) FALSE

 



Answer: A

Computer - Computer Literacy 101 - Chapter 9

How many steps are there in the system development life cycle?


A) 5

B) 4

C) 6

D) 10

 



Answer: C

Computer - Computer Literacy 101 - Chapter 9

What is the first step of the system development life cycle?


A) problem and opportunity identification

B) analysis

C) development and documentation

D) design

 



Answer: A

Computer - Computer Literacy 101 - Chapter 9

PREV 1 2 3 4 5 6 7 8 NEXT