Type your Name Here Chapter

advertisement
Type your Name Here
ITSC 1301 Introduction to Computers
Chapter 11 & 12 Homework Questions
True or False. Type in a "T" or "F" in the blank to the left of the question.
___ 1.
Computer viruses do not generate by chance, they are intentionally written.
___ 2.
A worm program is designed to repeatedly copy itself into memory or on a disk drive until no memory
or disk space remains, at which point the computer stops working.
___ 3.
A polymorphic virus can be detected with a virus signature.
___ 4.
Computer based training helps students learn by using computers and completing exercises with
instructional software.
___ 5.
A biometric device is any item that a user must carry to gain access to a computer facility, such as
badges, cards, or keys.
___ 6.
With Computer-aided surgery, computers actually operate on human beings.
___ 7.
Retinal scanners measure the pressure a person exerts and the motion used to write a signature.
___ 8.
Hardware theft of portable equipment, such as notebook computers and hand-held computers is
generally not a problem, but most desktop and larger computer systems do pose serious theft risks.
___ 9.
Distance learning, also called distance education, is a type of educational software that combines
education with entertainment.
___ 10.
Information privacy refers to the rights of individuals and organizations to deny or restrict the collection
and use of information about them.
___ 11.
Employee monitoring involves the use of computers to observe, record, and review employee
communications and keyboard activity.
___ 12.
Surge protectors are 100% effective; large power surges cannot bypass the protector and repeated small
over voltages have no effect on a surge protector.
___ 13.
Long-term computer work cannot lead to tendonitis or carpal tunnel syndrome.
___ 14.
Intellectual property rights are the rights to which creators are entitled for their inventions, writings, and
works of art.
===============================================================
Multiple Choice. Type your choice for the most correct option in the blank on the left.
___ 15.
_____ is a type of training that uses internet technology.
A. computer-based training
C. Web-based training
B. Computer-aided instruction
D. Edutainment
___ 16.
A _______ is a virus that hides within or is designed to look like a legitimate program.
A. Boot sector virus
C. Trojan horse virus
B. File virus
D. Polymorphic virus
___ 17.
A time bomb is a program that _______
A. Activates on a particular date
B. Replaces the program used to start the system
C. Performs an activity when a certain action has occurred
D. Is designed to repeatedly copy itself in memory or on a disk
___ 18.
Which of the following is not an area of computer ethics?
A. Information accuracy
C. Codes of conduct
B. Computer system failure
D. Information privacy
___ 19.
A book published online is called a(n) ________ book.
A. Web
C. electronic
B. online
D. published
___ 20.
To protect against being infected by a computer virus, experts recommend all of the following except
_____________________.
A. Install virus protection on every system on which you work
B. Turn your computer off at night so no one can gain access to it.
C. Check before using any diskette, use an anti-virus scan program to check for viruses
D. Check all programs downloaded from other sources.
___ 21.
A password ____________________
A. Usually identifies the application that will be used
B. Is a secret combination of characters identifying the place of employment
C. Is usually assigned by the organization
D. Is usually confidential
___ 22.
A(n) ______ is a company or person you believe will not send you a virus-infected file knowingly.
A. trusted source
C. certificate authority
B. antivirus author
D. grandparent
___ 23.
A(n) __________ tries to access a computer or computer network illegally.
A. hacker
C. auditor
B. unidentified user
D. software tester
___ 24.
_________ is the application of human intelligence to computers.
A. Green computing
C. Networking
B. AI
D. Neural networks
___ 25.
A ________ virus executes when you turn on the computer.
A. file
C. macro
B. Boot
D. time bomb
Download