What do you think?
Should a computer virus distribution sentence carry the same penalty as
manslaughter?
Should it be a crime to steal a copy of computer data while leaving the original data
in place and unaltered?
Should hackers be sent to jail if they cannot pay restitution to companies and
individuals who lost money as the result of a prank?
Do you think that a hacker would make a good consultant on computer security?
Final test. Do the tasks in the following test.
1. A (n) ___ is a copy of one or more files that has been made in case the original files become damaged.
2. The Windows ___ is an important group of files that the Windows operating system uses to store configuration information about all the devices and software installed on a computer system.
3. The main directory of a disk is referred to as the ___ directory.
4. The main hard disk drive on a PC is often referred to as “drive C”. (True/False)
5. A filename extension is usually related to a file ___, which is the arrangement of data in a file and the coding scheme used to represent the data.
6. Antivirus software is 100% reliable when it comes to protecting your computer from viruses. (True/False)
7. A file specification or path typically includes all of the following information EXCEPT ___.
a) the file author b) the file name c) the file extension d) the drive letter
8. ___ software is a set of utility programs that looks for and eradicates viruses, worms, and Trojan horses.
9. File-naming ___ are a set of rules for naming files.
10. The easiest way to convert a file from one format to another is to find an application program that works with both file formats. (True/False)
11. Deleting a file’s icon from a directory does not necessarily remove the data from the disk. (True/False)
12. A computer ___ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.
13. A root directory typically contains smaller ___, often depicted as folders in graphical user interfaces.
14. A (n) ___ is a computer program that seems to perform one function while actually doing something else.
15. A virus can be spread if people distribute infected files by ___.
a) exchanging disks or CDs b) sending e-mail attachments
c) downloading software from the Web d) all of the above
16. You should update your antivirus software regularly. (True/False)
17. Bot-infected computers linked together into a network is called a(n) ___.
18. A virus ___ is a section of the virus program that can be used to identify a known virus.
19. Computer virus trigger events are often tied to a specific date. (True/False)
20. The file ___ helps you keep track of the most current version of your file when you have saved several versions.
Достарыңызбен бөлісу: |