Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Introduction to computers Fall 2021 (7) (8) (9) ) The terms malicious software and malware refer to any computer program 1. designed to surreptitiously enter

Introduction to computers
image text in transcribed
image text in transcribed
Fall 2021 (7) (8) (9) ) The terms malicious software and malware refer to any computer program 1. designed to surreptitiously enter a computer, b. gain unauthorized access to data c. disrupt normal processing operations d. All The Above The Computer RAM holds Data waiting to be processed b. Data After Process Instructions used to process data d. All The Above MS OUTLOOK and EUDORA are examples of a. Desktop publishing SW b. Web browsers c. Presentation SW d. E-Mail SW Which of the following contains data that cannot be changed? a DVD-RW b. CD-ROM CCD-RW d. Floppy Copyright is a form of: (10) (ID) a. Legal protection for the author b. Legal protection for the user c. Legal protection for the sales person d. All the Above. () (12) Types of security software: a. Anti-Virus b. Anti-Spyware c. Firewalls d. All the above (13) A computer virus is: a. A Set of program instructions b. A Set of software Page 3 c. A+B d. None of the above (14) Spyware: a. Gathers personal information b. Can steal password c. Can get to any computer d. All the above (15) Software licenses: a. Define the way in which you may use a program b. Define the way in which you may use a computer c. Define the way in which you may use a printer d. All the above Q2: Mark Truc or False in the corresponding Answer sheet (0.5 point each) (1) AGP, PCI, and ISA are types of Expansion Cards. (2) A Sound Card is an input device. (3) A personal computer system is a PC, software and the peripheral devices that are connected to the PC. Versatility refers to the ability of the device to access data from several storage media. (5) The two main software categories are operating system and utilities. (6) A peripheral device designates input, output, and storage equipment added to a computer to enhance its functionality. (7) RAM is several chips plugged into the motherboard. (8) An optical storage device is affected by dust. (9) A magnetic tape access data directly. (10) A scanner is an example of a storage device. (11) A flash drive is an example of optical storage. (12) RAM tells the computer how to access the hard disk. (13) The term multiple threats describes malware that combines more than one type of malicious program Page 4

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Strategic Database Technology Management For The Year 2000

Authors: Alan Simon

1st Edition

155860264X, 978-1558602649

More Books

Students also viewed these Databases questions

Question

Demonstrate three aspects of assessing group performance?

Answered: 1 week ago

Question

How to find if any no. is divisble by 4 or not ?

Answered: 1 week ago

Question

Explain the Pascals Law ?

Answered: 1 week ago

Question

What are the objectives of performance appraisal ?

Answered: 1 week ago