If you encounter a trojan horse what has happened you read


Computer Literacy

If you encounter a Trojan Horse what has happened? You read a fake email from a bank that appears to be asking for personal information. Someone has stolen your credit card and used it to purchase items online. A hacker placed a program in your computer that granted illegal access to your files. You have installed a virus protection program on your computer.

Question 2. 2. Which of the following is an example of computer phishing?

A fraudulent email from a bank asking for account information.

A virus that infects your computer and sends out information.

A software error in your computer and causes it to crash.

A computer hacker that breaks into your computer.

Question 3. 3. The term "computer literacy" dates back to what decade? (Points : 1)

1960s

1970s

1980s

1990s

Question 4. 4. A computer worm is MOST likely to attack your computer's: (Points : 1)

printer.

scanner.

memory.

monitor.

Question 5. 5. Many people describe computers as "complex" machines. What can this mean? (Points : 1)

Computers are smarter than humans.

Computers are understood by very few people because of their intricate technical components .

Computers run software programs with hard to use features.

Computers have had both a positive and negative effect on society.

Question 6. 6. Which of the following is NOT an example of systems software? (Points : 1)

Operating systems

Utilities

Device drivers

Applications

Question 7. 7. Which action BEST describes a branch in a computer program?

It jumps to a non-sequential line number.

It moves

one line number ahead.

It moves one line number backwards.

It stays on the same line number and calculates new data.

Question 8. 8. In the 1970s which company developed computer innovations such as the mouse, graphical user interface, and word processors?

Microsoft

IBM

Xerox

Apple

Question 9. 9. Which of the following is an operating system?

Microsoft

MAC

Apple

Windows

Question 10. 10. Which of the following components was a significant development featured in the Macintosh LISA computer?

C Prompt

Disk Operating System

Graphical User Interface

Memory

Request for Solution File

Ask an Expert for Answer!!
C/C++ Programming: If you encounter a trojan horse what has happened you read
Reference No:- TGS01030737

Expected delivery within 24 Hours