Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Introduction to computers Fall 2021 (7) (8) (9) ) The terms malicious software and malware refer to any computer program 1. designed to surreptitiously enter
Introduction to computers
Fall 2021 (7) (8) (9) ) The terms malicious software and malware refer to any computer program 1. designed to surreptitiously enter a computer, b. gain unauthorized access to data c. disrupt normal processing operations d. All The Above The Computer RAM holds Data waiting to be processed b. Data After Process Instructions used to process data d. All The Above MS OUTLOOK and EUDORA are examples of a. Desktop publishing SW b. Web browsers c. Presentation SW d. E-Mail SW Which of the following contains data that cannot be changed? a DVD-RW b. CD-ROM CCD-RW d. Floppy Copyright is a form of: (10) (ID) a. Legal protection for the author b. Legal protection for the user c. Legal protection for the sales person d. All the Above. () (12) Types of security software: a. Anti-Virus b. Anti-Spyware c. Firewalls d. All the above (13) A computer virus is: a. A Set of program instructions b. A Set of software Page 3 c. A+B d. None of the above (14) Spyware: a. Gathers personal information b. Can steal password c. Can get to any computer d. All the above (15) Software licenses: a. Define the way in which you may use a program b. Define the way in which you may use a computer c. Define the way in which you may use a printer d. All the above Q2: Mark Truc or False in the corresponding Answer sheet (0.5 point each) (1) AGP, PCI, and ISA are types of Expansion Cards. (2) A Sound Card is an input device. (3) A personal computer system is a PC, software and the peripheral devices that are connected to the PC. Versatility refers to the ability of the device to access data from several storage media. (5) The two main software categories are operating system and utilities. (6) A peripheral device designates input, output, and storage equipment added to a computer to enhance its functionality. (7) RAM is several chips plugged into the motherboard. (8) An optical storage device is affected by dust. (9) A magnetic tape access data directly. (10) A scanner is an example of a storage device. (11) A flash drive is an example of optical storage. (12) RAM tells the computer how to access the hard disk. (13) The term multiple threats describes malware that combines more than one type of malicious program Page 4 Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started