Computer Worms and Viruses / Internet Basics
what is the first worm to be distributed over a network without other users being aware of its presence?
morris worm
what is the act of a computer virus attaching itself to another computer program?
piggybacking
what is a form of informal Internet communication?
social media
a website is...
a system of online documents that are linked together
what is NOT a search engine?
chrome
what type of URL domains end with .gov?
government agencies
what is a defense technique to protect computers from incoming risks?
have a secure firewall
what is the least credible website domain?
.com
what actions will help keep you safe when working online?
1. installing antivirus software on your computer 2. keeping software programs updated 3. ensuring a site begins with https or shows a lock icon before entering credit card information
what makes a secure password?
1. use at least 7 letters 2. include a number 3. use a symbol 4. use a mix of upper-case and lower-case letters
what year did researchers at Xerox Palo Alto Research develop the first experimental worm?
1980
what year was the first virus, "Elk Cloner," created?
1982
what is a hacker?
a computer user who attempts to acquire unauthorized entry to servers and computer systems
what is the original broadband?
dial up
how is entering a web address different than a search term?
web addresses require correct spelling
what do you call computer programs that allow users to view websites and navigate between them?
web browsers
what feature lets you save a web address for future use?
bookmarks
what is true about a worm?
it moves or copies itself to a computer without the user's knowledge
what is NOT an action of protecting a computer from a virus?
leaving the computer log in when using a public computer
a Trojan Horse will possibly ______.
monitor keystrokes and browsing activity
the first virus created in 1982 was the ______ virus.
Elk Cloner
when was the Internet created?
January 1983
what is a search engine?
a software program which searches the Internet for words or phrases and returns a list as to where each is located
a Trojan Horse will generally attempt to gain access to which type of area on a computer?
administrative
what is an online predator?
an adult Internet user who uses social networking sites, chat rooms, or other cyberspace to approach and hurt other people
what virus copies itself onto a computer or a disk when the computer is booted up?
boot sector virus
e-mail is considered what type of Internet use?
communication
what is also referred to as malware?
computer virus
what uses the top-level domain of ".edu?"
educational institutions
computer files generally back themselves up automatically, so there is no need to frequently back up important files. True or False?
false
free anti-virus software on the Internet will protect a user's computer as well as a paid program. True or False?
false
the Internet and the World Wide Web are the same thing. True or False?
false
what is NOT a common e-mail system?
according to the Computer Fraud and Abuse Act, what is the punishment for creating a worm or virus for fraud?
imprisonment for up to 20 years and/or a fine
what could be a negative result of continued Internet growth?
more government regulations and restrictions
what is a computer worm which copies different segments of itself to computers linked together in a network?
network worm
where is the scroll bar located in a web browser?
right of the window
what web browser is used on MAC computers?
safari
what is NOT a way computer viruses are spread?
secure networks
what is NOT considered a type of internet connection?
server
a web browser is defined as what?
software program retrieving and presenting data using the Internet
if anyone attempted to view an infected sector, the virus would replace it with the clean, original version of the sector is known as a ______.
stealth virus
to open a web browser, you would double click...
the left moue button
what is NOT a similarity between a worm and a virus?
they both use host programs to replicate
how many parts make up a web address?
three
viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list. True or False?
true
a computer ______ is a malicious, self-replicating independent program but a computer ______ is a malicious program requiring a host program to replicate.
worm; virus
the first page that appears when accessing a website is called...
homepage
there are two types of computer worms: a network worm and a ______?
host worm
"WWW" is the abbreviation for what?
World Wide Web
what year was the first anti-virus software introduced?
1990
imprisonment time for a computer virus can range from 0 to ______ years?
20
what is an anti-virus software recommended only for the Windows system?
McAfee VirusScan
what is an anti-virus software recommended for Windows and Mac systems?
Norton AntiVirus
who wrote "Computer Virus: A High Tech Disease" which explains how to create a virus?
Ralph Burger