What term describes a crime that involves the use of computer technology?
A. Phishing
B. Scam
C. Computer Crime
D. None of these
Answer
Correct Answer: C. Computer Crime
A. Phishing
B. Scam
C. Computer Crime
D. None of these
Correct Answer: C. Computer Crime
A. Trojan Horse
B. Worm
C. Spyware
D. Adware
Correct Answer: B. Worm
Worm is a type of computer virus that is designed to spread from computer to computer over a network. Worms are self-replicating malware that can exploit vulnerabilities in computer systems and networks to propagate themselves. They don’t require user intervention to spread and can automatically send copies of themselves to other devices connected to the same network. Once a worm infects a system, it can consume network resources, degrade performance, and carry out malicious activities, such as installing backdoors or stealing sensitive information.
A. Utility Program
B. System Software
C. Application Software
D. Scripting Software
Correct Answer: C. Application Software
Application Software is a type of computer program that is used to perform a specific task, such as creating a spreadsheet or editing an image. Application software is designed to meet the needs and requirements of users by providing functionality and tools for various purposes. It includes programs like word processors, spreadsheets, graphics editors, video editors, web browsers, and many others. Utility programs, system software, and scripting software serve different purposes. Utility programs provide tools for system maintenance and optimization, system software controls hardware and software resources, and scripting software allows users to automate tasks or create custom programs.
A. Trojan Virus
B. Worm
C. Spyware
D. Adware
Correct Answer: A. Trojan Virus
Trojan Virus is a type of computer virus that is designed to disguise itself as a legitimate program or file. It derives its name from the story of the Trojan Horse in Greek mythology, where a deceptive wooden horse was used to gain entry into the city of Troy. Similarly, a Trojan virus appears to be harmless or beneficial, enticing users to download or execute it. Once activated, it can perform malicious actions, such as stealing sensitive information, damaging files, or providing unauthorized access to the attacker. Worms, spyware, and adware are other types of malware, but they have different characteristics and objectives.
A. Utility Software
B. System Software
C. Application Software
D. Scripting Software
Correct Answer: B. System Software
System Software is a type of computer program that is used to control the hardware and software resources of a computer system. System software acts as an intermediary between the computer hardware and the application software, enabling the efficient operation of the computer system. It includes operating systems, device drivers, firmware, and other essential programs that provide a platform for running application software. Utility software, application software, and scripting software are different categories of software that serve specific purposes but do not directly control the overall computer system.
A. RAM
B. ROM
C. SRAM
D. DRAM
Correct Answer: B. ROM
ROM (Read-Only Memory) is a type of non-volatile storage device that is used to store data permanently. ROM retains its data even when power is removed from the device. Unlike RAM (Random Access Memory), which is volatile and loses its data when power is turned off, ROM is specifically designed to store permanent data and instructions that are not meant to be modified.
A. Laptop
B. ABC
C. ATM
D. Server
Correct Answer: B. ABC
A. LCD
B. LED
C. MCR
D. Network Cards
Correct Answer: D. Network Cards
A. Allocates Resources
B. Monitors Activities
C. Manages Disks and Files
D. All of these
Correct Answer: D. All of these
A. Charles Babbage
B. Tim Berners-lee
C. Denis Rich
D. Martin Copper
Correct Answer: B. Tim Berners-lee