The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
This quiz is based on the types of computer viruses! Computers, since their creation, have made work easier, but one of the vices is that there is a risk of losing all your data in case a virus is introduced to the computer system. There are different ways that this can be done, and the quiz below is for computer technicians who want to learn about the different types and the effect they have on data and computers as a whole.
Questions and Answers
1.
What does VIRUS stand for?
Explanation The acronym VIRUS stands for "Vital information resources under siege". This implies that a virus is a threat to important information resources, as it can attack and compromise their security. The term "under siege" suggests that these resources are constantly under attack and at risk of being compromised or damaged. This acronym highlights the potential dangers and vulnerabilities associated with computer viruses.
Rate this question:
2.
Computer Virus can also be called "flu"?
A.
True
B.
False
Correct Answer
B. False
Explanation The statement is false because a computer virus cannot be called "flu". The term "flu" refers to influenza, which is a contagious respiratory illness caused by a virus. On the other hand, a computer virus is a malicious software program that infects computers and spreads from one system to another, causing damage to data and disrupting normal operations. While both "flu" and computer viruses can spread, they are completely different in nature and cannot be used interchangeably.
Rate this question:
3.
Virus cannot spread through
A.
USB
B.
Email
C.
Downloads
D.
Uploads
Correct Answer
D. Uploads
Explanation Viruses cannot spread through uploads because uploads refer to the act of transferring files from a local device to a remote server or platform. When files are uploaded, they are typically scanned for viruses before being stored or shared. This ensures that any potential viruses or malware are detected and prevented from spreading. Therefore, uploads are generally considered a safe method of transferring files without the risk of virus transmission.
Rate this question:
4.
Which of the following is not an antivirus software?
A.
Bitdefender
B.
Norton
C.
Evadobe
D.
McAfee
Correct Answer
C. Evadobe
Explanation Evadobe is not an antivirus software. Bitdefender, Norton, and McAfee are all well-known antivirus software programs that are designed to protect computers from malware, viruses, and other online threats. However, Evadobe is not a recognized antivirus software brand and does not offer the same level of protection as the other options listed.
Rate this question:
5.
"This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant." What is the name of this virus?
Correct Answer Direct action virus
Explanation A direct action virus is a type of virus that remains dormant until a specific file containing the virus is executed. Once the file is executed, the virus becomes active and starts infecting other files or systems. Unlike other types of viruses, direct action viruses do not infect files automatically or spread through networks. They require user intervention to execute the infected file and activate the virus.
Rate this question:
6.
A computer virus is much like a flu virus, is designed to spread from host to host and has the ability to _________________ itself.
Correct Answer replicate
Explanation A computer virus is similar to a flu virus in that it is created to move from one computer to another and has the capability to duplicate itself.
Rate this question:
7.
What are the signs of a computer virus?
A.
Changes on homepage
B.
Pop-up windows
C.
Repeated programs start up
D.
Option A and B
Correct Answer
D. Option A and B
Explanation The signs of a computer virus include changes on the homepage and pop-up windows. These changes can occur without the user's consent or knowledge and are often indicators of a malware infection. Pop-up windows can be intrusive and disruptive, appearing unexpectedly and potentially leading to further malware infiltration. Therefore, both options A and B are correct as they accurately identify common signs of a computer virus.
Rate this question:
8.
"This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer." What is the name of that virus?
Correct Answer Web scripting virus
Explanation A web scripting virus is a type of virus that takes advantage of vulnerabilities in web browsers and web pages. When a user accesses an infected web page, the virus is able to exploit the code and infect the user's computer. This type of virus specifically targets web scripting languages, such as JavaScript, to carry out its malicious activities.
Rate this question:
9.
What should be avoided to prevent your computer from a virus attack?
A.
Check the internet connection
B.
Turn your computer on without any unknown cables
C.
Download spyware software
D.
Always scan email attachments before opening
Correct Answer
D. Always scan email attachments before opening
Explanation To prevent a computer from a virus attack, it is important to always scan email attachments before opening them. This is because email attachments can sometimes contain malicious files or viruses that can infect the computer when opened. By scanning the attachments before opening, any potential threats can be detected and eliminated, ensuring the computer's safety. Checking the internet connection, turning on the computer without unknown cables, and downloading spyware software are also important precautions, but they do not specifically address the risk of virus attacks through email attachments.
Rate this question:
10.
Virus is developed in coding by professionals?
A.
True
B.
False
Correct Answer
A. True
Explanation The statement suggests that viruses are developed in coding by professionals. This implies that professionals who have coding skills are responsible for creating viruses. Therefore, the correct answer is "True."
Rate this question:
11.
General Antivirus softwares work with every operating system except one. Which one is that?
Correct Answer Mac OS
Explanation Mac OS is the operating system that is not compatible with general antivirus software. While most antivirus software is designed to work with various operating systems, Mac OS has its own built-in security features that make traditional antivirus software unnecessary. Mac OS has a lower risk of malware compared to other operating systems, which is why general antivirus software is not typically used on Mac computers.
Rate this question:
12.
The virus can only travel around within a country?
A.
True
B.
False
Correct Answer
B. False
Explanation The given answer is False because viruses are not limited to traveling within a country. Viruses can easily spread across borders through various means such as international travel, trade, and migration. They can be carried by infected individuals or transmitted through contaminated objects or surfaces. Therefore, it is important to implement international cooperation and measures to prevent the spread of viruses globally.
Rate this question:
13.
"Avast" is an example of?
Correct Answer Antivirus software
Explanation "Avast" is an example of antivirus software. Antivirus software is a type of computer program designed to detect, prevent, and remove malicious software, such as viruses, worms, and Trojan horses, from a computer system. "Avast" is a well-known antivirus software that provides protection against various online threats and offers features like real-time scanning, firewall protection, and malware removal. It is widely used by individuals and organizations to safeguard their systems from potential security risks.
Rate this question:
14.
Trojan horse is a useful software and can also
A.
Release all the viruses from your computer
B.
Do damage to your computer once installed or run on your computer
C.
Prevent a virus from attacking your computer
D.
Clean up the malicious code
Correct Answer
B. Do damage to your computer once installed or run on your computer
Explanation A Trojan horse is a type of malicious software that appears to be useful or harmless but actually contains harmful code. Once installed or executed on a computer, it can cause damage by performing various malicious activities such as stealing sensitive information, corrupting files, or giving unauthorized access to the attacker. Unlike antivirus software that prevents viruses from attacking a computer, a Trojan horse does the opposite by causing harm once it is installed or run on the computer.
Rate this question:
15.
A virus that changes its code each time an infected file is executed. It does this to evade antivirus programs. What is the virus called?
Correct Answer Polymorphic virus
Explanation A polymorphic virus is a type of virus that alters its code each time it infects a new file or is executed. This characteristic allows it to evade detection by antivirus programs, as its code constantly changes, making it difficult to identify and eliminate. The ability of the virus to modify its code helps it to remain undetected and continue spreading, posing a significant challenge for antivirus software.
Rate this question:
16.
Trojan reproduce by infecting other files and self replicate?
A.
True
B.
False
Correct Answer
A. True
Explanation Trojan horses (or Trojans) are a type of malware that can reproduce by infecting other files and self-replicate once they have infected a system. Trojans are often disguised as legitimate software or files, but when executed, they carry out malicious activities, which may include infecting other files or attempting to spread to other devices or systems. Their ability to self-replicate and propagate is a characteristic that distinguishes them from other forms of malware.
Rate this question:
17.
What is a disadvantage of a virus attack?
A.
None of the below
B.
It can destroy your operating system
C.
Depending on the severity of the virus, it can damage your hardware
D.
Can create an explosion within the CPU
Correct Answer
C. Depending on the severity of the virus, it can damage your hardware
Explanation A virus attack can be disadvantageous as it has the potential to damage hardware depending on the severity of the virus. This means that the virus can cause physical harm to the computer's components, leading to malfunction or permanent damage. This can result in the loss of important data, financial loss, and the need for costly repairs or replacements. Therefore, it is crucial to have proper security measures in place to prevent virus attacks and minimize the risk of hardware damage.
Rate this question:
18.
A worm is also considered a subclass of virus?
A.
True
B.
False
Correct Answer
A. True
Explanation A worm is considered a subclass of a virus because both are types of malicious software that can infect computer systems. However, there are some differences between the two. A virus needs a host file or program to attach itself to, while a worm is a standalone program that can spread itself across networks without needing a host. Additionally, worms are usually designed to exploit vulnerabilities in computer systems to spread rapidly, whereas viruses often rely on user actions to propagate. Despite these differences, both worms and viruses can cause significant harm to computer systems and are considered types of malware.
Rate this question:
19.
A worm cannot:
A.
Look similar to the virus
B.
Can travel from computer to computer
C.
Can replicate itself into a large amount of worms and spread itself fast.
D.
Can reduce the virus threat
Correct Answer
D. Can reduce the virus threat
Explanation A worm is a type of malware that can travel from computer to computer and replicate itself into a large number of worms, spreading itself quickly. However, it cannot reduce the virus threat. Worms are designed to exploit vulnerabilities in computer systems and networks, but they do not have the capability to actively reduce or eliminate other types of malware, such as viruses. Therefore, the statement "can reduce the virus threat" is not true for worms.
Rate this question:
20.
The kind of virus that infects and spreads in multiple ways is called macro virus.
A.
True
B.
False
Correct Answer
B. False
Explanation The statement is incorrect. The kind of virus that infects and spreads in multiple ways is not called a macro virus. Macro viruses are a type of virus that infects files created using certain applications, such as Microsoft Office, and use the application's own macro programming language to execute malicious actions. However, there are other types of viruses, such as file infectors and network viruses, that can infect and spread in multiple ways. Therefore, the correct answer is False.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.