Viruses, Worms, Lions, Tigers & Bears

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By SirNichol
S
SirNichol
Community Contributor
Quizzes Created: 1 | Total Attempts: 95
Questions: 12 | Attempts: 95

SettingsSettingsSettings
Viruses, Worms, Lions, Tigers & Bears - Quiz


This quiz will test your knowledge of viruses, worms and other things related to the area of computer maintenance.


Questions and Answers
  • 1. 

    What type of file extension should you never open that you receive from  someone not computer savvy

    • A.

      .ppt

    • B.

      .exl

    • C.

      .exe

    • D.

      .psd

    Correct Answer
    C. .exe
    Explanation
    The .exe file extension should never be opened if received from someone who is not computer savvy. This is because .exe files are executable files that can contain harmful software or viruses. Opening an .exe file from an untrusted source can potentially infect your computer or compromise your data. It is always important to exercise caution and verify the source before opening any file with the .exe extension.

    Rate this question:

  • 2. 

    Once infected with a computer virus, your computer will function differently almost immeadiately

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    When a computer is infected with a virus, the effects may not be immediately noticeable. In many cases, the virus remains dormant and does not immediately affect the computer's functioning. The virus may start executing its malicious activities after a certain trigger or condition is met, which can take some time. Therefore, it is not accurate to say that a computer will function differently almost immediately after being infected with a virus.

    Rate this question:

  • 3. 

    Which of the following does not fit

    • A.

      Virus

    • B.

      Hacker

    • C.

      Worm

    • D.

      Trogen

    Correct Answer
    B. Hacker
    Explanation
    The given options are all related to computer security threats, except for "Hacker". A virus, worm, and trojan are all types of malicious software that can harm computer systems, whereas a hacker refers to an individual who uses their technical skills to gain unauthorized access to computer systems or networks. While hackers can also be involved in cyber attacks, they are not inherently a type of computer security threat like viruses, worms, and trojans.

    Rate this question:

  • 4. 

    To put something in quarantine means to remove it from the computer that is infected

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. To put something in quarantine does not mean to remove it from the infected computer. Quarantine refers to isolating or segregating potentially harmful files or software in a secure location on the infected computer, in order to prevent them from causing further damage.

    Rate this question:

  • 5. 

    Which of the following was a famous computer virus

    • A.

      Mirror mirror on the wall

    • B.

      The Troll

    • C.

      You Got Mail

    • D.

      Melissa

    Correct Answer
    D. Melissa
    Explanation
    Melissa was a famous computer virus that spread through email in 1999. It was created by David L. Smith and named after a stripper in Florida. The virus infected Microsoft Word documents and sent itself to the top 50 contacts in the victim's email address book. Melissa caused widespread disruption by overwhelming email servers and slowing down internet traffic. It was one of the first viruses to use social engineering techniques, tricking users into opening infected attachments. The virus quickly spread globally, infecting millions of computers before antivirus companies were able to develop and distribute a patch to protect against it.

    Rate this question:

  • 6. 

    Which of the following is a good thing

    • A.

      Spider

    • B.

      Worm

    • C.

      Virus

    • D.

      Zombie

    Correct Answer
    A. Spider
    Explanation
    A spider is considered a good thing because it plays a vital role in controlling the population of other insects. Spiders are natural predators and help in keeping the insect population in check, which can be beneficial for maintaining ecological balance. Additionally, spiders are also important for pollination and are not harmful to humans unless they are venomous species. Therefore, having spiders around can be beneficial for the environment and ecosystem.

    Rate this question:

  • 7. 

    Mac's never get viruses

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "Mac's never get viruses" is false. While it is true that Mac computers have historically been less prone to viruses compared to Windows computers, they are not completely immune. Macs can still be infected by malware, adware, and other types of malicious software. It is important for Mac users to take precautions such as using antivirus software and keeping their operating system up to date to protect against potential threats.

    Rate this question:

  • 8. 

    There are more PC's than Mac's in the world

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that there are a greater number of PCs (personal computers) than Macs in the world. This implies that PCs have a larger market share or user base compared to Macs. It could be due to various factors such as affordability, availability, compatibility, or personal preferences. However, without specific data or statistics, it is difficult to determine the exact magnitude of this difference.

    Rate this question:

  • 9. 

    Browsers are software

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Browsers are software because they are computer programs that allow users to access and navigate the internet. They provide a graphical interface for users to view web pages, access websites, and interact with online content. Browsers are designed to interpret and display HTML, CSS, and other web technologies, enabling users to browse the internet and perform various online activities such as searching, shopping, and communication. Therefore, it is correct to say that browsers are software.

    Rate this question:

  • 10. 

    Browsers allow you to see what is on the Internet

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Browsers are software applications that allow users to access and view content on the Internet. They provide a graphical interface for users to navigate websites, view web pages, download files, and interact with online services. By typing a URL or clicking on a link, browsers retrieve and display the requested web content, including text, images, videos, and other multimedia elements. Therefore, it is true that browsers enable users to see what is on the Internet.

    Rate this question:

  • 11. 

    A sight that has some measure of security will usually have the following in its address

    • A.

      Ftp:

    • B.

      Http://

    • C.

      Https://

    • D.

      Www.secure.com

    Correct Answer
    C. Https://
    Explanation
    A sight that has some measure of security will usually have "https://" in its address. The "https" protocol indicates that the website is using a secure connection, encrypting the data transmitted between the user's browser and the website. This ensures that sensitive information, such as login credentials or credit card details, is protected from unauthorized access. Therefore, "https://" is a common indicator of a secure website.

    Rate this question:

  • 12. 

    Which browser at this time has the most  safeguards in place to help fight virus attack 

    • A.

      Chrome

    • B.

      Safari

    • C.

      Opera

    • D.

      Bing

    Correct Answer
    A. Chrome
    Explanation
    Chrome has the most safeguards in place to help fight virus attacks compared to Safari, Opera, and Bing. This is because Chrome is developed by Google, which has a strong focus on security and regularly updates its browser to address vulnerabilities. Chrome includes features like sandboxing, automatic updates, and a built-in safe browsing protection that warns users about potentially dangerous websites. Additionally, Chrome has a large user base, which means that any security issues are quickly identified and patched.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 08, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 17, 2013
    Quiz Created by
    SirNichol
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.