Basic Computer MCQs — Test 8
Page 1 of 3
Question 1
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Question 2
Malicious software is known as____________?
Question 3
A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Question 4
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
Question 5
In 1999, the Melissa virus was a widely publicised:____________?
Question 6
What type of virus uses computer hosts to reproduce itself?
Question 7
The thing that eventually terminates a worm virus is a lack of:
Question 8
When a logic bomb is activated by a time-related event, it is known as a____________?
Question 9
What is the name of an application program that gathers user information and sends it to someone through the Internet?
Question 10
____________is the measurement of things such as fingerprints and retinal scans used for security access?