Type your Name Here ITSC 1301 Introduction to Computers Chapter 11 & 12 Homework Questions True or False. Type in a "T" or "F" in the blank to the left of the question. ___ 1. Computer viruses do not generate by chance, they are intentionally written. ___ 2. A worm program is designed to repeatedly copy itself into memory or on a disk drive until no memory or disk space remains, at which point the computer stops working. ___ 3. A polymorphic virus can be detected with a virus signature. ___ 4. Computer based training helps students learn by using computers and completing exercises with instructional software. ___ 5. A biometric device is any item that a user must carry to gain access to a computer facility, such as badges, cards, or keys. ___ 6. With Computer-aided surgery, computers actually operate on human beings. ___ 7. Retinal scanners measure the pressure a person exerts and the motion used to write a signature. ___ 8. Hardware theft of portable equipment, such as notebook computers and hand-held computers is generally not a problem, but most desktop and larger computer systems do pose serious theft risks. ___ 9. Distance learning, also called distance education, is a type of educational software that combines education with entertainment. ___ 10. Information privacy refers to the rights of individuals and organizations to deny or restrict the collection and use of information about them. ___ 11. Employee monitoring involves the use of computers to observe, record, and review employee communications and keyboard activity. ___ 12. Surge protectors are 100% effective; large power surges cannot bypass the protector and repeated small over voltages have no effect on a surge protector. ___ 13. Long-term computer work cannot lead to tendonitis or carpal tunnel syndrome. ___ 14. Intellectual property rights are the rights to which creators are entitled for their inventions, writings, and works of art. =============================================================== Multiple Choice. Type your choice for the most correct option in the blank on the left. ___ 15. _____ is a type of training that uses internet technology. A. computer-based training C. Web-based training B. Computer-aided instruction D. Edutainment ___ 16. A _______ is a virus that hides within or is designed to look like a legitimate program. A. Boot sector virus C. Trojan horse virus B. File virus D. Polymorphic virus ___ 17. A time bomb is a program that _______ A. Activates on a particular date B. Replaces the program used to start the system C. Performs an activity when a certain action has occurred D. Is designed to repeatedly copy itself in memory or on a disk ___ 18. Which of the following is not an area of computer ethics? A. Information accuracy C. Codes of conduct B. Computer system failure D. Information privacy ___ 19. A book published online is called a(n) ________ book. A. Web C. electronic B. online D. published ___ 20. To protect against being infected by a computer virus, experts recommend all of the following except _____________________. A. Install virus protection on every system on which you work B. Turn your computer off at night so no one can gain access to it. C. Check before using any diskette, use an anti-virus scan program to check for viruses D. Check all programs downloaded from other sources. ___ 21. A password ____________________ A. Usually identifies the application that will be used B. Is a secret combination of characters identifying the place of employment C. Is usually assigned by the organization D. Is usually confidential ___ 22. A(n) ______ is a company or person you believe will not send you a virus-infected file knowingly. A. trusted source C. certificate authority B. antivirus author D. grandparent ___ 23. A(n) __________ tries to access a computer or computer network illegally. A. hacker C. auditor B. unidentified user D. software tester ___ 24. _________ is the application of human intelligence to computers. A. Green computing C. Networking B. AI D. Neural networks ___ 25. A ________ virus executes when you turn on the computer. A. file C. macro B. Boot D. time bomb