1.
Malicious software that is disguised as a useful program or software but when you download a video, music, picture, or document, and open the file, it then runs on your computer and will crash your entire system. It is often "hidden" in files. If you are NOT sure of the answer, look it up on www.b4ucopy.com
Correct Answer
B. Trojan horse
Explanation
A trojan horse is a type of malicious software that disguises itself as a useful program or software. When a user downloads a file, such as a video, music, picture, or document, and opens it, the trojan horse runs on their computer. Unlike other types of malware, a trojan horse does not replicate itself or spread to other systems. Instead, its purpose is to gain unauthorized access to the user's system and cause harm, such as crashing the entire system or stealing sensitive information.
2.
Any piece of programming code that is designed to harm your computer system. This term is short for "malicious software." It can come in any form, just like a virus or a worm. Once it is on your hard drive, it can take control of your cpu and disable software, delete files, and crash your cpu. If you are not sure of the answer, look it up on www.b4ucopy.com
Correct Answer
B. Malware
Explanation
Malware is a term used to describe any type of programming code that is created with the intention of causing harm to a computer system. It can take various forms, similar to a virus or a worm. Once it infiltrates a computer's hard drive, it can seize control of the CPU, disable software, delete files, and even cause the computer to crash.
3.
A piece of programming code designed to snoop on your computer system. It can copy your passwords, credit card numbers, and email addresses. It can also record exactly what you are doing on the internet and send it to a spymaster. if you are not sure of the answer, look it up on www.b4ucopy.com
Correct Answer
A. Spyware
Explanation
Spyware is a type of malicious software that is designed to secretly monitor and gather information from a computer system without the user's knowledge or consent. It can record sensitive data such as passwords, credit card numbers, and email addresses, as well as track the user's online activities. The collected information is then sent to a third party, often referred to as a "spymaster." Spyware is different from other types of malware such as trojan horses or zombie bots, as its main purpose is to gather information rather than causing direct harm to the system.
4.
This programming code is designed to disable your computer system.They infect your computer system by copying themselves to your hard drive. It can take control of your computer, damage software, and delete files. If you are unsure of the answer, look it up on www.b4ucopy.com
Correct Answer
D. Virus
Explanation
The given code is designed to infect and disable a computer system by copying itself to the hard drive. It can take control of the computer, damage software, and delete files. This behavior is characteristic of a virus, which is a type of malicious software that spreads and causes harm to a computer system.
5.
How many times can you copy a piece of software you bought from the store?
Correct Answer
A. Once
Explanation
When you buy a piece of software from the store, you are typically purchasing a single license to use that software. This means that you are legally allowed to make one copy of the software for personal use. Making additional copies would likely be a violation of copyright laws. Therefore, the correct answer is once.
6.
A copyright allows creative workers to profit from their labors and encourages creativity in American society as a whole
Correct Answer
A. True
Explanation
Copyright is a legal protection that grants exclusive rights to creators of original works, such as authors, artists, musicians, and filmmakers. By allowing these creative workers to profit from their labors, copyright incentivizes them to continue creating and contributing to American society's cultural and economic development. This protection fosters a climate of creativity and innovation, as it ensures that creators can benefit financially from their creations, which in turn encourages them to produce more original works. Therefore, the statement is true.
7.
If you provide copies of computer software, songs, movies, or other copyrighted works to others through a peer-to-peer (P2P) file sharing network you are violating anti-piracy laws.
Correct Answer
A. True
Explanation
Providing copies of copyrighted works through a peer-to-peer file sharing network is indeed a violation of anti-piracy laws. Peer-to-peer file sharing allows users to directly share files with each other without the need for a central server. When copyrighted works such as computer software, songs, movies, or other content are shared without proper authorization or licenses, it infringes on the rights of the copyright holder. This unauthorized distribution of copyrighted material is considered piracy and is illegal. Therefore, the statement "True" is the correct answer.
8.
It’s OK to copy content from the Internet and public domain for schoolwork.
Correct Answer
A. True
Explanation
The statement "It’s OK to copy content from the Internet and public domain for schoolwork" is true. When content is in the public domain, it means that it is not protected by copyright and can be freely used, copied, and distributed. However, it is important to properly cite and give credit to the original source when using content from the Internet or public domain to avoid plagiarism.
9.
It’s OK to install borrowed software on your computer or load borrowed music onto your MP3 player.
Correct Answer
B. False
Explanation
Installing borrowed software or loading borrowed music onto your MP3 player is not okay. This is because it violates copyright laws and intellectual property rights. Borrowed software or music should only be used for personal purposes and not distributed or shared without proper permission from the copyright holder.
10.
It’s OK to burn copies of music and software CDs for your friends.
Correct Answer
B. False
Explanation
Burning copies of music and software CDs for friends is not okay because it violates copyright laws. These laws protect the rights of the creators and owners of the music and software, and making unauthorized copies for others is considered piracy. It is important to respect intellectual property rights and support the artists and developers by purchasing legitimate copies of their work.
11.
Fair Use allows students to cite ideas and quotations from copyrighted works for educational purposes.
Correct Answer
A. True
Explanation
Fair Use is a legal doctrine that allows limited use of copyrighted material without permission from the copyright holder. It provides exceptions for certain purposes such as criticism, comment, news reporting, teaching, scholarship, or research. In an educational setting, students are allowed to cite ideas and quotations from copyrighted works under Fair Use as long as it is for educational purposes. Therefore, the statement that Fair Use allows students to cite ideas and quotations from copyrighted works for educational purposes is true.
12.
Anyone can freely use works that are in the public domain.
Correct Answer
A. True
Explanation
Works that are in the public domain are not protected by copyright law, which means that anyone can freely use them without permission or restrictions. This includes works whose copyright has expired, works that were never eligible for copyright protection, or works where the creator has intentionally placed them in the public domain. Therefore, the statement "Anyone can freely use works that are in the public domain" is true.
13.
Plagiarizing is no different from stealing.
Correct Answer
A. True
Explanation
Plagiarizing is the act of using someone else's work or ideas without giving them proper credit. Similarly, stealing involves taking someone else's property without permission. Both actions involve taking something that does not belong to you. Therefore, it can be said that plagiarizing is no different from stealing, as they both involve dishonesty and taking something that is not rightfully yours.