1.
What type of file extension should you never open that you receive from someone not computer savvy
Correct Answer
C. .exe
Explanation
The .exe file extension should never be opened if received from someone who is not computer savvy. This is because .exe files are executable files that can contain harmful software or viruses. Opening an .exe file from an untrusted source can potentially infect your computer or compromise your data. It is always important to exercise caution and verify the source before opening any file with the .exe extension.
2.
Once infected with a computer virus, your computer will function differently almost immeadiately
Correct Answer
B. False
Explanation
When a computer is infected with a virus, the effects may not be immediately noticeable. In many cases, the virus remains dormant and does not immediately affect the computer's functioning. The virus may start executing its malicious activities after a certain trigger or condition is met, which can take some time. Therefore, it is not accurate to say that a computer will function differently almost immediately after being infected with a virus.
3.
Which of the following does not fit
Correct Answer
B. Hacker
Explanation
The given options are all related to computer security threats, except for "Hacker". A virus, worm, and trojan are all types of malicious software that can harm computer systems, whereas a hacker refers to an individual who uses their technical skills to gain unauthorized access to computer systems or networks. While hackers can also be involved in cyber attacks, they are not inherently a type of computer security threat like viruses, worms, and trojans.
4.
To put something in quarantine means to remove it from the computer that is infected
Correct Answer
B. False
Explanation
The given statement is false. To put something in quarantine does not mean to remove it from the infected computer. Quarantine refers to isolating or segregating potentially harmful files or software in a secure location on the infected computer, in order to prevent them from causing further damage.
5.
Which of the following was a famous computer virus
Correct Answer
D. Melissa
Explanation
Melissa was a famous computer virus that spread through email in 1999. It was created by David L. Smith and named after a stripper in Florida. The virus infected Microsoft Word documents and sent itself to the top 50 contacts in the victim's email address book. Melissa caused widespread disruption by overwhelming email servers and slowing down internet traffic. It was one of the first viruses to use social engineering techniques, tricking users into opening infected attachments. The virus quickly spread globally, infecting millions of computers before antivirus companies were able to develop and distribute a patch to protect against it.
6.
Which of the following is a good thing
Correct Answer
A. Spider
Explanation
A spider is considered a good thing because it plays a vital role in controlling the population of other insects. Spiders are natural predators and help in keeping the insect population in check, which can be beneficial for maintaining ecological balance. Additionally, spiders are also important for pollination and are not harmful to humans unless they are venomous species. Therefore, having spiders around can be beneficial for the environment and ecosystem.
7.
Mac's never get viruses
Correct Answer
B. False
Explanation
The statement "Mac's never get viruses" is false. While it is true that Mac computers have historically been less prone to viruses compared to Windows computers, they are not completely immune. Macs can still be infected by malware, adware, and other types of malicious software. It is important for Mac users to take precautions such as using antivirus software and keeping their operating system up to date to protect against potential threats.
8.
There are more PC's than Mac's in the world
Correct Answer
A. True
Explanation
The statement suggests that there are a greater number of PCs (personal computers) than Macs in the world. This implies that PCs have a larger market share or user base compared to Macs. It could be due to various factors such as affordability, availability, compatibility, or personal preferences. However, without specific data or statistics, it is difficult to determine the exact magnitude of this difference.
9.
Browsers are software
Correct Answer
A. True
Explanation
Browsers are software because they are computer programs that allow users to access and navigate the internet. They provide a graphical interface for users to view web pages, access websites, and interact with online content. Browsers are designed to interpret and display HTML, CSS, and other web technologies, enabling users to browse the internet and perform various online activities such as searching, shopping, and communication. Therefore, it is correct to say that browsers are software.
10.
Browsers allow you to see what is on the Internet
Correct Answer
A. True
Explanation
Browsers are software applications that allow users to access and view content on the Internet. They provide a graphical interface for users to navigate websites, view web pages, download files, and interact with online services. By typing a URL or clicking on a link, browsers retrieve and display the requested web content, including text, images, videos, and other multimedia elements. Therefore, it is true that browsers enable users to see what is on the Internet.
11.
A sight that has some measure of security will usually have the following in its address
Correct Answer
C. Https://
Explanation
A sight that has some measure of security will usually have "https://" in its address. The "https" protocol indicates that the website is using a secure connection, encrypting the data transmitted between the user's browser and the website. This ensures that sensitive information, such as login credentials or credit card details, is protected from unauthorized access. Therefore, "https://" is a common indicator of a secure website.
12.
Which browser at this time has the most safeguards in place to help fight virus attack
Correct Answer
A. Chrome
Explanation
Chrome has the most safeguards in place to help fight virus attacks compared to Safari, Opera, and Bing. This is because Chrome is developed by Google, which has a strong focus on security and regularly updates its browser to address vulnerabilities. Chrome includes features like sandboxing, automatic updates, and a built-in safe browsing protection that warns users about potentially dangerous websites. Additionally, Chrome has a large user base, which means that any security issues are quickly identified and patched.