1.
Computer crimes are illegal acts involving computers.
Correct Answer
A. True
Explanation
The statement is true because computer crimes refer to any illegal activities that are committed using computers or computer networks. These crimes can include hacking, identity theft, fraud, spreading malware, and various forms of cyberattacks. Such acts are considered illegal because they violate laws and regulations related to computer systems, data protection, privacy, and intellectual property. As technology continues to advance, computer crimes have become more prevalent and sophisticated, leading to the need for strict laws and cybersecurity measures to combat these illegal activities.
2.
LA virus is a potentially damaging computer program designed to affect your computer negatively but only with your knowledge or permission by altering the way it works.
Correct Answer
B. False
Explanation
A virus is a potentially damaging computer program designed to affect your computer negatively, whether or not you have knowledge or permission, by altering the way it works. Therefore, the statement that a virus can only affect your computer with your knowledge or permission is incorrect.
3.
A virus can only be implemented in one file and cannot spread.
Correct Answer
B. False
Explanation
False. This statement is incorrect. A virus can be implemented in multiple files and can spread from one file to another, infecting the system or other devices. Viruses are designed to replicate themselves and spread through various means, such as email attachments, infected websites, or shared files. Therefore, it is essential to have proper antivirus software and take precautions to prevent the spread of viruses.
4.
A piece of software that has a virus attached to it is called a host program.
Correct Answer
A. True
Explanation
A host program refers to a piece of software that contains a virus attached to it. This means that the virus is embedded within the host program, allowing it to spread and infect other files or systems. Therefore, the given statement is true as it correctly identifies a software with a virus as a host program.
5.
A virus cannot hide once it is implanted in a computer file.
Correct Answer
B. False
Explanation
This statement is false because viruses can indeed hide once they are implanted in a computer file. Viruses are designed to be stealthy and can use various techniques to hide their presence, such as encryption, rootkit functionality, and disguising themselves as legitimate files or processes. This allows them to avoid detection by antivirus software and continue their malicious activities undetected.
6.
Creators of computer viruses write them for a reason, they never happen by chance.
Correct Answer
A. True
Explanation
Computer viruses are not created by chance; they are intentionally developed by individuals known as creators or hackers. These individuals have specific motives for creating viruses, such as causing harm to computer systems, stealing personal information, or gaining unauthorized access to networks. The creation of computer viruses requires knowledge and expertise in programming and computer systems, indicating that they are purposefully designed rather than occurring randomly.
7.
A virus payload can never be harmless.
Correct Answer
B. False
Explanation
This statement is false because it is possible for a virus payload to be harmless. A virus payload refers to the harmful or malicious part of a computer virus that is designed to cause damage or perform unauthorized actions. However, not all virus payloads are harmful. Some virus payloads may be designed for research purposes, to test security systems, or to raise awareness about vulnerabilities. These harmless virus payloads are created with the intention of not causing any damage to the infected system.
8.
A sign that your computer has a virus is the sudden change in the memory your computer has left.
Correct Answer
A. True
Explanation
A sudden change in the memory your computer has left can be a sign that your computer has a virus. Viruses can consume a significant amount of memory, causing a decrease in available memory. This sudden change in memory can indicate the presence of a virus, as normal computer operations typically do not result in such a drastic change. Therefore, the statement is true.
9.
A computer that runs slow is another sign there may be a virus.
Correct Answer
A. True
Explanation
A computer running slow can be an indication of a virus because viruses can consume a significant amount of system resources, causing the computer to slow down. When a virus infects a computer, it can perform various malicious activities in the background, such as running unwanted processes or using up memory and CPU power. These activities can result in decreased performance and slower response times. Therefore, if a computer is running slow, it is possible that it has been infected by a virus.
10.
When the computer runs the infected boot program, it loads the virus into the computer’s memory.
Correct Answer
A. True
Explanation
When a computer runs an infected boot program, it means that the program is executed and its instructions are carried out. In this case, the infected boot program contains a virus, which is a type of malicious software. As the program is loaded into the computer's memory, the virus is also loaded along with it. This allows the virus to actively operate within the computer's memory, potentially causing harm and spreading to other files or programs. Therefore, the statement "When the computer runs the infected boot program, it loads the virus into the computer's memory" is true.
11.
Although the worm named Melissa spread to computers all over the world, it was virtually a harmless virus.
Correct Answer
B. False
Explanation
The statement suggests that the worm named Melissa was virtually a harmless virus. However, the correct answer is False, indicating that the statement is not true. This implies that the worm named Melissa was not harmless and potentially caused damage or harm to computers all over the world.
12.
The Trojan Horse virus is usually a virus that only explodes when certain information or actions are utilized on the computer.
Correct Answer
B. False
Explanation
The given statement is false. The Trojan Horse virus is a type of malware that disguises itself as legitimate software, tricking users into downloading and installing it. Once installed, it can perform various malicious activities on the computer, such as stealing sensitive information, corrupting files, or allowing unauthorized access to the system. Unlike the statement suggests, the Trojan Horse virus does not require specific information or actions to activate or explode. It can cause harm as soon as it is installed on the computer.
13.
Viruses are usually spread to other computers through outside storage devices such as USBs or flash drives but never through downloads.
Correct Answer
B. False
Explanation
This statement is false. Viruses can be spread through downloads from the internet. Downloading files or software from untrusted sources can expose a computer to viruses and malware. It is important to have antivirus software and to only download files from trusted sources to minimize the risk of virus infection.
14.
It is important to back your files up often.
Correct Answer
A. True
Explanation
Backing up files regularly is important because it helps protect against data loss. If files are not backed up and something happens to the device they are stored on, such as a hardware failure or a virus attack, the files may be permanently lost. Regularly backing up files ensures that there is a copy of the data stored in a separate location, reducing the risk of losing important information.
15.
Pirated software poses no threat to your computers but should never be used because it is morally wrong.
Correct Answer
B. False
Explanation
The statement contradicts itself. It states that pirated software poses no threat to computers, but then goes on to say that it should never be used because it is morally wrong. This implies that there is a threat, not only to computers but also to ethical principles. Therefore, the correct answer is False.
16.
You really should not use the email preview to help prevent getting a virus on your computer.
Correct Answer
A. True
Explanation
Using the email preview can help prevent getting a virus on your computer because it allows you to view the content of an email without actually opening it. This way, you can identify any suspicious or potentially harmful attachments or links before taking the risk of opening them. By previewing emails, you can exercise caution and avoid inadvertently downloading or executing malicious files that could infect your computer.
17.
Using an antivirus program is one of the more effective ways to protect against computer viruses.
Correct Answer
A. True
Explanation
Using an antivirus program is indeed one of the more effective ways to protect against computer viruses. Antivirus software is designed to detect, prevent, and remove malicious software, including viruses, from computers. It scans files and programs for any suspicious activity or code, and if a virus is detected, it can quarantine or delete it. Regularly updating the antivirus program ensures that it stays up-to-date with the latest virus definitions, enhancing its ability to detect and protect against new threats. Therefore, using an antivirus program is crucial in safeguarding the computer and its data from potential virus infections.
18.
Virus hoaxes are false warnings about viruses that spread via e-mail and over the internet.
Correct Answer
A. True
Explanation
Virus hoaxes are indeed false warnings about viruses that are spread through email and over the internet. These hoaxes often contain exaggerated or misleading information, causing unnecessary panic and fear among users. They typically urge recipients to forward the message to others, perpetuating the spread of false information. It is important to be cautious and verify the authenticity of such warnings before sharing them further.