Which part of the computer is directly involved in executing the instructions of the computer program
(A) The scanner
(B) The main storage
(C) The secondary storage
(D) The processor
The thing that eventually terminates a worm virus is a lack of:
(A) Memory or disk space.
(B) Time.
(C) CD drives space.
(D) CD-RW.
What type of virus uses computer hosts to reproduce itself
(A) Time bomb
(B) Worm
(C) Melissa virus
(D) Macro virus
In 1999, the Melissa virus was a widely publicised:____________
(A) E-mail virus.
(B) Macro virus.
(C) Trojan horse.
(D) Time bomb.
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________
(A) Trojan horse.
(B) Virus.
(C) Time bomb.
(D) Time-related bomb sequenc
A program that performs a useful task while simultaneously allowing destructive acts is a___________
(A) Worm.
(B) Trojan horse.
(C) Virus.
(D) Macro virus
Malicious software is known as____________
(A) Badware.
(B) Malware.
(C) Maliciousware.
(D) Illegalware
Collecting personal information and effectively posing as another individual is known as the crime of_____________
(A) Spooling.
(B) Identity theft.
(C) Spoofing.
(D) Hacking.
The common name for the crime of stealing passwords is____________
(A) Jacking.
(B) Identity theft.
(C) Spoofing.
(D) Hacking.
The typical computer criminal is a(n)____________
(A) Young hacker.
(B) Trusted employee with no criminal record.
(C) Trusted employee with a long, but unknown criminal recor
(D)