1.
What is a virus?
Correct Answer
A. A typically small piece of software that is attached onto other programs
Explanation
A virus is a typically small piece of software that is attached onto other programs. This means that it is not a standalone program, but rather it piggybacks onto existing software. Once attached, the virus can replicate itself and spread to other programs or files, causing harm to the computer system. This method of infection allows viruses to easily spread and infect multiple files or computers, making them a common threat in the digital world.
2.
What ways are viruses transported?
Correct Answer(s)
A. E-mail
B. Music downloads
C. Cookies
Explanation
Viruses can be transported through various means such as email, music downloads, and cookies. Email attachments can contain malicious files that can infect a computer when opened. Similarly, downloading music from untrusted sources can lead to the inadvertent download of infected files. Additionally, cookies, which are small files stored on a user's computer by websites, can be manipulated by hackers to deliver malware. Therefore, it is important to exercise caution when engaging in these activities to prevent virus transmission.
3.
A Trojan Horse is a type of virus.
Correct Answer
A. True
Explanation
A Trojan Horse is a type of malware that disguises itself as a legitimate program or file in order to gain unauthorized access to a computer system. It is often used by hackers to steal sensitive information or to gain control over a computer. While a Trojan Horse is often referred to as a virus, it is technically not a virus itself. However, it is still considered a type of malware, making the statement "A Trojan Horse is a type of virus" true.
4.
What does a computer Worm do?
Correct Answer
A. It uses computer networks and security holes to replicate itself
Explanation
A computer worm is a type of malicious software that is designed to self-replicate and spread across computer networks. Unlike viruses, worms do not need to attach themselves to an existing program or file to infect a computer. Instead, they take advantage of security vulnerabilities to automatically replicate and spread to other computers. This can cause significant damage to computer systems and networks by consuming bandwidth, slowing down systems, and potentially compromising sensitive information.
5.
The way a virus travels through your e-mail is by an Attachment.
Correct Answer
A. True
Explanation
A virus can indeed travel through email attachments. When an infected attachment is opened or downloaded, the virus can gain access to the recipient's computer system and potentially cause harm. It is important to exercise caution when opening attachments from unknown or suspicious sources to avoid falling victim to a virus or malware attack.
6.
What yead did the ILOVEYOU virus appear?
Correct Answer
B. 2000
Explanation
The ILOVEYOU virus appeared in the year 2000.
7.
A firewall is considered a Antivirus Software
Correct Answer
A. True
Explanation
A firewall is not considered antivirus software. While both are security measures, they serve different purposes. A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, protecting against unauthorized access and potential threats. On the other hand, antivirus software is designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojans, from a computer system. It scans files and programs for known patterns of malicious code and takes actions to quarantine or remove them.
8.
What is one way a hacker can break into your PC?
Correct Answer
A. A hacker will locate your IP address and target low security computers
Explanation
A hacker can break into your PC by locating your IP address and targeting low security computers. This is because the IP address acts as a unique identifier for your computer on the internet, and if the hacker can find it, they can then focus their efforts on finding vulnerabilities in computers with low security measures in place. By exploiting these vulnerabilities, the hacker can gain unauthorized access to your PC and potentially steal sensitive information or cause damage.
9.
What choice(s) are the key targets for computer hackers
Correct Answer(s)
A. Computers that have not been updates
B. Computers with old software on it
C. Computers lacking in virus protection
Explanation
Computer hackers target computers that have not been updated, computers with old software, and computers lacking in virus protection because these vulnerabilities provide an opportunity for hackers to exploit. Outdated software and lack of updates often mean that the computer's security features are not up to date, making it easier for hackers to find and exploit vulnerabilities. Similarly, computers lacking in virus protection are more susceptible to malware and other malicious attacks, providing hackers with an entry point to gain unauthorized access or steal sensitive information.
10.
Their is only 1 kind of anti-virus available to the public.
Correct Answer
B. False
Explanation
The statement is false because there are multiple kinds of anti-virus software available to the public. There are various companies and developers that offer different anti-virus programs with different features and capabilities. Users can choose from a range of options based on their specific needs and preferences. Therefore, the statement that there is only 1 kind of anti-virus available to the public is incorrect.
11.
All legitamate virus protection costs money
Correct Answer
B. False
Explanation
The statement "All legitimate virus protection costs money" is false because there are many legitimate virus protection options available for free. While some antivirus software may require a paid subscription for additional features or advanced protection, there are reputable free antivirus programs that offer basic protection against viruses and malware. Therefore, it is not true that all legitimate virus protection costs money.
12.
The best way to avoid viruses in e-mails is to not open up junk mail, and to avoid suspicious e-mail senders or subjects.
Correct Answer
A. True
Explanation
The statement is true because opening junk mail or emails from suspicious senders or with suspicious subjects increases the risk of getting viruses. By not opening these types of emails, one can significantly reduce the chances of getting infected with viruses.
13.
Why is all of this important for digital artists?
Correct Answer(s)
A. Viruses can damage software.
B. Viruses can corrupt files in your computer and destroy important documents.
C. Viruses can infect important OS files that shut down computers.
Explanation
Digital artists rely heavily on software and computer systems to create their artwork. If their software gets damaged by viruses, it can hinder their ability to work efficiently and effectively. Additionally, if viruses corrupt files in their computer, it can result in the loss of important documents and artwork. Moreover, if viruses infect important OS files that shut down computers, it can disrupt their workflow and cause significant downtime. Therefore, understanding the importance of protecting against viruses is crucial for digital artists to ensure the safety and integrity of their work.