1 |
What is a malicious program called that is activated when a specific set of conditions are met |
- A. Trojan horse
- B. Virus
- C. Worm
- D. Logic bomb
|
2 |
Additional copy of your data is called. |
- A. Moving of data
- B. Taking of data
- C. Backup of data
- D. Taking of data
|
3 |
The secret word or number used for protection is |
- A. Biometric data
- B. Back up
- C. Password
- D. Private
|
4 |
A person who gain illegal access to a computer system is called. |
- A. Hacker
- B. Worm
- C. Pirats
- D. User
|
5 |
A virus that replicates itself is called |
- A. Bug
- B. Warm
- C. Vaccine
- D. Bomb
|
6 |
________is a software used for data compression |
- A. Word
- B. Excel
- C. WinZip
- D. Windows
|
7 |
Security protection for personal computer include. |
- A. Internal component
- B. Lock and cables
- C. Software
- D. All of these
|
8 |
An additional copy of your data on storage media is called; |
- A. Backup data
- B. Taking of data
- C. Moving of data
- D. None
|
9 |
Which is not cause of virus |
- A. E Mail
- B. Net work
- C. Pirated software
- D. Logic bomb
|
10 |
Which one is a secrat word that is used to prevent unauthorized access. |
- A. Biometrics
- B. Backup
- C. Copyright
- D. Password
|