Computer Worms and Viruses / Internet Basics

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

what is the first worm to be distributed over a network without other users being aware of its presence?

morris worm

what is the act of a computer virus attaching itself to another computer program?

piggybacking

what is a form of informal Internet communication?

social media

a website is...

a system of online documents that are linked together

what is NOT a search engine?

chrome

what type of URL domains end with .gov?

government agencies

what is a defense technique to protect computers from incoming risks?

have a secure firewall

what is the least credible website domain?

.com

what actions will help keep you safe when working online?

1. installing antivirus software on your computer 2. keeping software programs updated 3. ensuring a site begins with https or shows a lock icon before entering credit card information

what makes a secure password?

1. use at least 7 letters 2. include a number 3. use a symbol 4. use a mix of upper-case and lower-case letters

what year did researchers at Xerox Palo Alto Research develop the first experimental worm?

1980

what year was the first virus, "Elk Cloner," created?

1982

what is a hacker?

a computer user who attempts to acquire unauthorized entry to servers and computer systems

what is the original broadband?

dial up

how is entering a web address different than a search term?

web addresses require correct spelling

what do you call computer programs that allow users to view websites and navigate between them?

web browsers

what feature lets you save a web address for future use?

bookmarks

what is true about a worm?

it moves or copies itself to a computer without the user's knowledge

what is NOT an action of protecting a computer from a virus?

leaving the computer log in when using a public computer

a Trojan Horse will possibly ______.

monitor keystrokes and browsing activity

the first virus created in 1982 was the ______ virus.

Elk Cloner

when was the Internet created?

January 1983

what is a search engine?

a software program which searches the Internet for words or phrases and returns a list as to where each is located

a Trojan Horse will generally attempt to gain access to which type of area on a computer?

administrative

what is an online predator?

an adult Internet user who uses social networking sites, chat rooms, or other cyberspace to approach and hurt other people

what virus copies itself onto a computer or a disk when the computer is booted up?

boot sector virus

e-mail is considered what type of Internet use?

communication

what is also referred to as malware?

computer virus

what uses the top-level domain of ".edu?"

educational institutions

computer files generally back themselves up automatically, so there is no need to frequently back up important files. True or False?

false

free anti-virus software on the Internet will protect a user's computer as well as a paid program. True or False?

false

the Internet and the World Wide Web are the same thing. True or False?

false

what is NOT a common e-mail system?

google

according to the Computer Fraud and Abuse Act, what is the punishment for creating a worm or virus for fraud?

imprisonment for up to 20 years and/or a fine

what could be a negative result of continued Internet growth?

more government regulations and restrictions

what is a computer worm which copies different segments of itself to computers linked together in a network?

network worm

where is the scroll bar located in a web browser?

right of the window

what web browser is used on MAC computers?

safari

what is NOT a way computer viruses are spread?

secure networks

what is NOT considered a type of internet connection?

server

a web browser is defined as what?

software program retrieving and presenting data using the Internet

if anyone attempted to view an infected sector, the virus would replace it with the clean, original version of the sector is known as a ______.

stealth virus

to open a web browser, you would double click...

the left moue button

what is NOT a similarity between a worm and a virus?

they both use host programs to replicate

how many parts make up a web address?

three

viruses in e-mails can find a user's e-mail list then send itself in an attachment to all of the contacts on the list. True or False?

true

a computer ______ is a malicious, self-replicating independent program but a computer ______ is a malicious program requiring a host program to replicate.

worm; virus

the first page that appears when accessing a website is called...

homepage

there are two types of computer worms: a network worm and a ______?

host worm

"WWW" is the abbreviation for what?

World Wide Web

what year was the first anti-virus software introduced?

1990

imprisonment time for a computer virus can range from 0 to ______ years?

20

what is an anti-virus software recommended only for the Windows system?

McAfee VirusScan

what is an anti-virus software recommended for Windows and Mac systems?

Norton AntiVirus

who wrote "Computer Virus: A High Tech Disease" which explains how to create a virus?

Ralph Burger


Ensembles d'études connexes

Unit 2: Airplane Instruments, Engines, and Systems

View Set

SCM Forecasting & Demand Planning

View Set

Social Psych Midterm 1 Practice Questions

View Set

Ch. 6 A Tour of the Cell Dynamic Study Module

View Set

Life Insurance Policy Provisions, Options, and Riders

View Set

Trail Guide to the Body WB: Spine & Thorax

View Set