1.
Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains damaging code.
Correct Answer
B. Viruses
Explanation
Viruses are a type of program that pretends to have useful or desirable features but actually contains damaging code. Unlike Trojans, which deceive users into downloading malicious software, viruses are self-replicating and can spread from one computer to another. They often disguise themselves as legitimate files or programs and can cause harm by corrupting or deleting data, disrupting system operations, or even stealing personal information. Unlike worms, viruses require user interaction or the execution of an infected file to spread. Adware, on the other hand, is a type of software that displays unwanted advertisements and does not typically contain damaging code.
2.
Which of the following is the type of software that has self-replicating software that causes damage to files and system?
Correct Answer
D. Spyware
Explanation
Spyware is not the correct answer to this question. The correct answer is "Worms." Worms are a type of self-replicating software that can cause damage to files and systems. Unlike viruses, worms do not require a host program to attach themselves to, and they can spread independently over computer networks. Trojan horses are malicious programs that disguise themselves as legitimate software, while spyware is software that secretly collects information about a user's activities without their knowledge or consent.
3.
Which of the following is difficult to detect?
Correct Answer
D. Spyware
Explanation
Spyware is difficult to detect because it is designed to run in the background without the user's knowledge. Unlike viruses, Trojan horses, and worms which often show noticeable symptoms such as slowing down the computer or causing it to crash, spyware operates silently and covertly. It is specifically designed to collect sensitive information such as passwords, credit card numbers, and browsing habits without the user's consent. Spyware can be challenging to detect and remove as it often disguises itself as legitimate software or hides within other programs, making it a significant threat to privacy and security.
4.
Which of the following is message is try to acquire personal information?
Correct Answer
B. pHishing
Explanation
Phishing is a type of cyber attack where the attacker disguises themselves as a trustworthy entity to acquire personal information such as usernames, passwords, and credit card details. They often use deceptive emails, websites, or messages to trick individuals into revealing their sensitive information. Unlike spam, which is unsolicited bulk messages, phishing specifically targets personal information. Chain letters and junk mail may be annoying or unwanted, but they do not typically involve attempts to acquire personal information.
5.
Which of following is harmful for computer?
Correct Answer
B. Virus
Explanation
A virus is harmful for a computer because it is a type of malicious software that can replicate itself and spread to other computers. Once a computer is infected with a virus, it can cause various issues such as slowing down the system, corrupting files, stealing personal information, and even rendering the computer unusable. Viruses can be introduced to a computer through various means such as downloading infected files, opening infected email attachments, or visiting malicious websites. It is important to have proper security measures in place, such as anti-virus software, to protect against viruses and prevent damage to the computer.
6.
Computer virus is simply a_______________.
Correct Answer
B. Set of computer instructions or code
Explanation
A computer virus is a set of computer instructions or code that is designed to replicate itself and spread to other computers. It is not a disease or a type of bacteria, and it is not a hardware component. Computer viruses can cause various types of damage to a computer system, such as corrupting files, stealing personal information, or disrupting normal system operations. They are typically created by malicious individuals with the intent to harm or gain unauthorized access to computer systems.
7.
Example of computer anti virus program includes.
Correct Answer
D. All of these
Explanation
The correct answer is "All of these" because Norton, McAfee, and Dr.Solomon toolkit are all examples of computer antivirus programs.
8.
Cc: stands for?
Correct Answer
B. Carbon Copy
Explanation
The acronym "Cc" stands for "Carbon Copy." It originated from the practice of making copies of documents using carbon paper. When a document was typed or written, a carbon paper would be placed between the original and the copy paper, resulting in a duplicate copy with the same content. In the digital age, "Cc" is used in email to indicate that additional recipients are being copied on the message.
9.
Incoming message are stored in a folder known as
Correct Answer
B. Inbox
Explanation
Incoming messages are stored in a folder known as the "Inbox". This is where all the new and unread messages are received and stored until they are read or moved to another folder. The Inbox is a common feature in email systems and messaging platforms, providing users with a centralized location to access and manage their incoming messages.
10.
Which folder is used to store the deleted e-mails.
Correct Answer
B. Trash
Explanation
The correct answer is "Trash" because it is the folder specifically designated for storing deleted emails. When a user deletes an email, it is moved to the Trash folder where it can be permanently deleted or restored if needed. The Trash folder acts as a temporary holding place for emails that have been discarded by the user.