1. Which one of the following would be considered as a way that a computer virus can enter a computer system ?

Opening an application previously installed on the computer

Borrowed copies of software

Viewing a website without causing any additional transactions

Running antivirus programs

Answer: Viewing a website without causing any additional transactions

Explanation:

Viewing a website without causing any additional transactions


2. What is the most common way to get a virus in your computer’s hard disk ?

By installing games from their CDROMS

By uploading pictures from mobile phones to the computer

By opening emails

By sending emails

Answer: By opening emails

Explanation:

The most common way to get a virus on your computer's hard disk is by opening emails or downloading and installing software or files from untrusted or malicious websites or sources. Therefore, the correct option is (c) By opening emails. It is important to be cautious while opening emails and downloading files from the internet to avoid getting infected with viruses or malware.


3. There are several primary categories of procedures. Which of the following is not a primary category of procedures ?

Testing

Backup and recovery

Firewall development

Design

Answer: Firewall development

Explanation:

Firewall development is not a primary category of procedures. The primary categories of procedures are usually identified as: design, implementation, testing, documentation, and maintenance. Backup and recovery is typically considered a part of implementation or maintenance, depending on the context.


4. Passwords enables user to ?

get into the system quickly

make efficient use of time

retain confidentiality of files

simplify file structure

Answer: retain confidentiality of files

Explanation:

The correct answer is (c) retain confidentiality of files. Passwords are a security mechanism used to protect access to information and systems by verifying the identity of the user. The primary purpose of passwords is to ensure the confidentiality and integrity of sensitive information by preventing unauthorized access to it. While passwords can also be used to facilitate quick access and efficient use of time, their primary function is to maintain security and protect confidential information.


5. A program designed to destroy data on your computer which can travel to “infect” other computers is called a __________ ?

disease

torpedo

hurricane

virus

Answer: virus

Explanation:

virus


6. Passwords enable users to – ?

get into the system quickly

make efficient use of time

retain confidentiality of files

simplify file structures

Answer: retain confidentiality of files

Explanation:

retain confidentiality of files. Passwords are used as a security measure to protect sensitive information and files from unauthorized access. By requiring a password to access a system or file, it ensures that only authorized users can view or modify the content. Therefore, the use of passwords helps in maintaining the confidentiality of files. The other options mentioned are not related to the purpose of passwords.


7. Why is it unethical to share copyrighted files with your friends ?

It is not unethical, because it is legal.

It is unethical because the files are being given for free.

Sharing copyrighted files without permission breaks copyright laws.

It is not unethical because the files are being given for free.

Answer: Sharing copyrighted files without permission breaks copyright laws.

Explanation:

The correct answer is (c) Sharing copyrighted files without permission breaks copyright laws. Copyright is a legal right that grants the creator of an original work exclusive rights to determine whether and how their work may be used by others. Sharing copyrighted files with friends without the permission of the copyright owner is a violation of their exclusive rights, which is illegal and therefore unethical. The fact that the files are being given for free or that anyone can access a computer does not justify the violation of copyright laws.


8. Hackers ?

all have the same motive

is another name for users

may legally break into computers as long as they do not do any damage

break into other people’s computers

Answer: break into other people’s computers

Explanation:

break into other people's computers is the most accurate statement about hackers. Hackers are individuals who use their computer expertise to gain unauthorized access to computer systems, networks, and data. This activity is often illegal and can cause significant harm to individuals, organizations, and society as a whole. Hackers can have different motives, including financial gain, political activism, or simply the challenge of breaking into a system. It is important to note that hacking is not the same as ethical hacking, where individuals are authorized to test computer systems for vulnerabilities to improve security.