1.
Intellectual Property (books, music, movies) says ____________ is illegal.
Correct Answer
A. File sharing
Explanation
Intellectual Property (books, music, movies) says file sharing is illegal. This is because file sharing involves the unauthorized distribution of copyrighted material without the permission of the copyright owner. Sharing copyrighted files without proper authorization infringes on the rights of the creators and owners of the intellectual property, which is protected by copyright laws.
2.
Keyloggers can track and record all of the keystrokes entered on a computer.
Correct Answer
A. True
Explanation
Keyloggers are software programs or hardware devices that can track and record every keystroke entered on a computer. This includes keystrokes typed in documents, passwords entered on websites, and messages typed in chat applications. Keyloggers are often used for malicious purposes, such as stealing sensitive information or monitoring someone's activities without their knowledge. Therefore, the statement that keyloggers can track and record all keystrokes entered on a computer is true.
3.
What is the proper way to display the following:
Correct Answer
C. HTTP://
Explanation
The correct way to display the given text is "HTTP://". This is because URLs use forward slashes ("/") to separate different parts of the address, and "HTTP://" is the standard prefix for web addresses. The other options provided ("HTTP//", "HTTP:\\", "HTML://") do not follow the correct format for displaying URLs.
4.
Which of the following is used by people trying to trick you into revealing personal information such as username and passwords?
Correct Answer
B. pHising
Explanation
Phishing is a technique used by malicious individuals to trick people into disclosing sensitive information like usernames and passwords. It typically involves sending fake emails or creating fake websites that appear legitimate, aiming to deceive users into providing their personal data. This information is then used for fraudulent activities such as identity theft or unauthorized access to accounts.
5.
Copyright laws state that it is ILLEGAL to make a copy of items you have purchased for your own personal use.
Correct Answer
B. False
Explanation
The statement is incorrect. Copyright laws generally allow individuals to make copies of items they have purchased for their own personal use. This includes making backup copies of digital media or creating copies of physical media for personal use. However, it is important to note that distributing or sharing these copies with others without permission would still be considered illegal.
6.
Cookies are small text files that websites put on your computer to store information about you and your preferences.
Correct Answer
A. True
Explanation
Cookies are indeed small text files that websites use to store information about users and their preferences. These files are stored on the user's computer and are used to track their browsing activity, remember login information, and personalize their experience on the website. Therefore, the statement "True" accurately describes the nature and purpose of cookies.
7.
Spyware will....
Correct Answer
B. Send information about your web surfing habits to a website without your knowledge
Explanation
Spyware is a type of malicious software that secretly gathers information about a user's online activities and sends it to a website without their knowledge. This can include details about websites visited, search queries, and other browsing habits. Unlike phishing attempts that trick users into revealing personal information, spyware operates discreetly in the background, making it difficult for users to detect. By collecting and transmitting this data, spyware poses a significant threat to user privacy and can potentially lead to identity theft or other forms of cybercrime.
8.
The difference between a Virus and a Worm is, a virus inserts itself into files while a worm replicates itself.
Correct Answer
A. True
Explanation
A virus and a worm are both types of malicious software, but they differ in their behavior. A virus is designed to insert itself into files, such as executable files or documents, and spread by infecting other files when those files are opened or executed. On the other hand, a worm is a standalone program that replicates itself and spreads independently by exploiting vulnerabilities in computer networks or systems. Therefore, the statement that a virus inserts itself into files while a worm replicates itself is true.
9.
A Trojan Horse enters a computer by appearing to be another program.
Correct Answer
A. True
Explanation
A Trojan Horse is a type of malicious software that disguises itself as a legitimate program or file in order to gain access to a computer system. It tricks users into downloading or installing it, often by appearing as something harmless or desirable. Once inside the computer, the Trojan Horse can perform various malicious activities, such as stealing sensitive information, damaging files, or allowing unauthorized access to the system. Therefore, the statement "A Trojan Horse enters a computer by appearing to be another program" is true because it accurately describes the deceptive nature of this type of malware.
10.
Another name for a program is a Directory?
Correct Answer
B. False
Explanation
The given answer is False. Another name for a program is not a Directory. A program refers to a set of instructions or code that performs a specific task on a computer, while a directory is a container that holds files and other directories. Although directories can contain programs, they are not synonymous terms.