Home    Categories / Topics    Computer   Computer Literacy 101   Chapter 9   

A virus signature is a portion of virus code that is unique to a particular computer virus.

  1. TRUE

  2. FALSE

Answer:

A

Instant messaging programs are susceptible to virus attacks.

  1. TRUE

  2. FALSE

Answer:

A

The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive.

  1. TRUE

  2. FALSE

Answer:

B

Wireless networks are no more vulnerable to packet sniffers than are wired networks.

  1. TRUE

  2. FALSE

Answer:

B

Many photocopiers have hard drives just as computers do which makes them a potential target for identity thieves.

  1. TRUE

  2. FALSE

Answer:

A

Photocopiers do not present any vulnerability for potential hackers.

  1. TRUE

  2. FALSE

Answer:

B

A zombie is another person's computer controlled by a hacker.

  1. TRUE

  2. FALSE

Answer:

A

A person with malicious intent can take complete control of your computer by using a backdoor program.

  1. TRUE

  2. FALSE

Answer:

A

How many steps are there in the system development life cycle?

  1. 5

  2. 4

  3. 6

  4. 10

Answer:

C

What is the first step of the system development life cycle?

  1. problem and opportunity identification

  2. analysis

  3. development and documentation

  4. design

Answer:

A