A program that interferes with the normal routine of the computers is called:
- (A) Virus
- (B) Antivirus
- (C) Freeware
- (D) Shareware
- (A) Virus
A special program that can detect and remove viruses from computer is called:
- (A) Anti-Virus
- (B) Virus
- (C) Group ware
- (D) Custom
- (A) Anti-Virus
Which of the following is an example of an antivirus program?
- (A) McAfee
- (B) Norton
- (C) Dr. Solomon toolkit
- (D) All of these
- (D) All of these
How does a virus reach from one computer to another?
- (A) Data is exchanged between computers
- (B) Exchange of display screen
- (C) Exchange of key board
- (D) Exchange of printer
- (A) Data is exchanged between computers
Which of the following is a computer virus?
- (A) Chernobal
- (B) Logic Bomb
- (C) Redlof
- (D) All of these
- (D) All of these
What is a malicious program called that is activated when a specific set of conditions are met?
- (A) Trojan horse
- (B) Worm
- (C) Virus
- (D) Logic bomb
- (D) Logic bomb
Making illegal copies of copyrighted software is called:
- (A) Software piracy
- (B) Browsing
- (C) Collaboration
- (D) Electronic distribution
- (A) Software piracy
Software that is available free for a limited period is called:
- (A) Freeware
- (B) Shareware
- (C) Groupware
- (D) Vertical
- (B) Shareware
What of the following is used in denial of service attacks?
- (A) Worm
- (B) Zombie
- (C) Virus
- (D) Virus
- (B) Zombie
Which of the following is the correct order for the phases of virus execution process?
- 1) Propagation phase
- ii) Dormant phase
- iii) Execution phase
- iv) Triggering phase
- (A) ii, iii, and iv
- (B) i, ii and iv
- (C) ii, i, iv, iii
- (D) None of the above
- (C) ii, i, iv, iii