FUNDAMENTALS OF COMPUTERS Start Quiz

Advertise Here

Questions for FUNDAMENTALS OF COMPUTERS exam

Q:41) .............. is the measurement of things such as fingerprints and retinal scans used for security access.

Answer: 
A

Q:42) What is the name of an application program that gathers user information and sends it to someone through the Internet?

Answer: 
B

Q:43) A logice bomb that was created to erupt on Michelangel's birthday is an example of a:

Answer: 
C

Q:44) When a logic bomb is activated by a time-related event, it is known as a:

Answer: 
C

Q:45) The thing that eventually terminates a worm virus is a lack of:

Answer: 
A

Q:46) What type of virus uses computer hosts to reproduce itself?

Answer: 
B

Q:47) In 1999, the Melissa virus was a widely publicised:

Answer: 
A

Q:48) An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

Answer: 
B

Q:49) A program that performs a usefull task while ltaneously allowing destructive acts is a:

Answer: 
B

Q:50) Malicious software is known as:

Answer: 
B

Q:51) Collecting personal information and effectively posing as another individual is known as the crime of:

Answer: 
B

Q:52) The common name for the crime of stealing passwords is:

Answer: 
C

Q:53) The typical computer criminal is a(n):

Answer: 
B

Q:54) The computer abbreviation KB usually means

Answer: 
C

Q:55) Which of the following is not a storage medium?

Answer: 
D

Q:56) In a computer, most processing takes place in

Answer: 
D

Q:57) A modem is connected to

Answer: 
A

Q:58) Which of the following helps to protect floppy disks from data getting accidentally erased?

Answer: 
B

Q:59) Which of the following contains permanent data and gets updated during the processing of transactions?

Answer: 
D

Q:60) Which of the following is the smallest storage?

Answer: 
A