Computer Virus and MS Access Quiz
54 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What characteristic is associated with stealth viruses?

  • Display annoying pop-ups
  • Infest operating systems
  • Destroy all hardware
  • Hide their presence (correct)

Which method is not commonly used for virus detection?

  • Checking of executing files
  • Heuristic analysis
  • Copying files (correct)
  • Scanning

A computer can be infected by a virus primarily when it is:

  • Running a system update
  • Performing routine maintenance
  • Loading drivers
  • Executing the infected program (correct)

What is the primary function of detector programs?

<p>Treat the infected files (C)</p> Signup and view all the answers

Which best describes a computer virus?

<p>A specially written program that harms systems (D)</p> Signup and view all the answers

What are the two main groups of viruses?

<p>Resident and non-resident (B)</p> Signup and view all the answers

Which type of virus uses errors in software to function?

<p>Viruses interceptors (C)</p> Signup and view all the answers

Which of the following is an example of an anti-virus program?

<p>Kaspersky KAV (C)</p> Signup and view all the answers

Which operation is primarily used for arranging data?

<p>Sorting of data (C)</p> Signup and view all the answers

What is the primary purpose of the 'Home' commands in MS Access?

<p>To work with tables (B)</p> Signup and view all the answers

Connected fields in MS Access have what characteristic?

<p>Different names but the same type of data (D)</p> Signup and view all the answers

What functionality does the 'Create' tab in MS Access provide?

<p>Create new table, form, report, query, macro, and module (C)</p> Signup and view all the answers

Which view in MS Access is used to change the table structure?

<p>Design view (D)</p> Signup and view all the answers

Which level does Platform as a Service (PaaS) primarily represent?

<p>Intermediate level of a platform (B)</p> Signup and view all the answers

Which system is responsible for global coordinates determination?

<p>GPS (D)</p> Signup and view all the answers

What allows users to make calls and send messages?

<p>GSM (C)</p> Signup and view all the answers

What is the function of the 'AutoNumber' in the 'ID' field of a database?

<p>Auto input of sequential numbers (C)</p> Signup and view all the answers

Which of the following is a Google service?

<p>Google+, My account (A)</p> Signup and view all the answers

Which components are part of the working area in MS Access?

<p>Database window and its objects windows (D)</p> Signup and view all the answers

What is essential for improving cybersecurity concerning user access?

<p>Each user of the system shall have the personal password (A)</p> Signup and view all the answers

Which commands are included in the 'Database tools' tab?

<p>Macro, show/hide, and analyze (A)</p> Signup and view all the answers

Which of the following are main types of computer viruses?

<p>Program, load, macro viruses (B)</p> Signup and view all the answers

How are records sorted in MS Access if sorted in increasing order by numeric values?

<p>$10, $25, $35, $50 (A)</p> Signup and view all the answers

Which formats are associated with executed files in cybersecurity?

<p>*.exe, .com, .bat (B)</p> Signup and view all the answers

How are computer viruses classified based on their habitat?

<p>Network, file, loading, file and loading (A)</p> Signup and view all the answers

What does the logical operator 'not' select in MS Access?

<p>Coincident values (D)</p> Signup and view all the answers

What is the primary purpose of a Query in MS Access?

<p>Presenting data in printing view (C)</p> Signup and view all the answers

What is the intended function of a Form in MS Access?

<p>Perform acts defined by entered data (C)</p> Signup and view all the answers

Which logical operator is used to select words that do not begin with the letter 'Т'?

<p>not Т (C)</p> Signup and view all the answers

What is a method for creating queries in database management?

<p>Classic (C)</p> Signup and view all the answers

Which form creation method is specific to MS Access?

<p>Form wizard (D)</p> Signup and view all the answers

What is the technology that distributes information from a server to clients, particularly used on mobile devices?

<p>Mobile push-notification messages (C)</p> Signup and view all the answers

Which cloud computing model provides access specifically to operating systems and database management systems?

<p>Platform as a Service (D)</p> Signup and view all the answers

What feature is necessary to work with Google Documents in an online collaborative mode?

<p>Open shared access (B)</p> Signup and view all the answers

What is a known defect of cloud computing?

<p>Not controllability of data (C)</p> Signup and view all the answers

What defines an environment suited for processing and storing various formats of information on the Internet?

<p>Cloud technologies (B)</p> Signup and view all the answers

Which application would be considered a mobile application?

<p>Software (D)</p> Signup and view all the answers

Which organization sets international recommendations in telecommunications?

<p>ITU (A)</p> Signup and view all the answers

How many levels of cloud technologies are generally recognized?

<p>3 (C)</p> Signup and view all the answers

What is a distinctive feature of a computer virus?

<p>Ability to run without user interaction (C)</p> Signup and view all the answers

How can a computer become infected with a virus?

<p>When executing an infected program (B)</p> Signup and view all the answers

What defines a computer virus?

<p>Malicious software that can replicate and damage systems (D)</p> Signup and view all the answers

What are the main stages of e-government development in Kazakhstan?

<p>Information, interactive, transactional (C)</p> Signup and view all the answers

What is a necessary data requirement for authorizing on the Web portal of 'Electronic government'?

<p>Personal identification number and password of the user (A)</p> Signup and view all the answers

What is the primary function of e-services in the context of e-government?

<p>To streamline service delivery through ICT tools (A)</p> Signup and view all the answers

What is the main purpose of the law 'About the Electronic Document and the Digital Signature'?

<p>To establish standards for digital documentation (B)</p> Signup and view all the answers

Which document approved the National Program for Building up e-Government in Kazakhstan for 2005-2007?

<p>Presidential Decree No. 1471 (A)</p> Signup and view all the answers

What form of e-commerce allows consumers to set their own prices?

<p>Consumer-to-business (C2B) (D)</p> Signup and view all the answers

Which stage of the e-government development in Kazakhstan came first?

<p>Information (A)</p> Signup and view all the answers

What is a characteristic of the second stage of e-government development in Kazakhstan?

<p>Transactional stage (D)</p> Signup and view all the answers

What is the main function of the e-learning system?

<p>Providing an innovative approach to education (C)</p> Signup and view all the answers

Which component is essential for distance learning?

<p>Web conferences (D)</p> Signup and view all the answers

What is not suitable for e-commerce?

<p>Online job searching (D)</p> Signup and view all the answers

What is the focus of the Program for Bridging Digital Divide in Kazakhstan?

<p>Increasing access to ICT for marginalized communities (B)</p> Signup and view all the answers

Flashcards

Sorting Data

The process of organizing and arranging data in a logical order, typically alphabetically or numerically.

MS Access Report

A type of database object in MS Access used for presenting data in a visually appealing, easy-to-understand format. It's similar to a formatted document that allows for customization and presentation of specific data from tables or queries.

Connected Fields in MS Access

In MS Access, connected fields refer to fields in different tables that share the same name and data type. This enables the database to establish relationships between tables and access information from both tables using these linked fields.

MS Access 'Create' Tab

The 'Create' tab in MS Access provides tools for creating new database objects like tables, forms, reports, queries, macros, and modules. It's your main toolbox for building the database structure.

Signup and view all the flashcards

MS Access 'Design' View

The 'Design view' in MS Access allows you to modify the structure of a table by adding, deleting, or changing fields, their data types, and properties. It is used to define the layout and functionality of your tables.

Signup and view all the flashcards

Query Wizard

A method of creating queries in databases, where users can visually drag and drop objects and set criteria to create queries.

Signup and view all the flashcards

Mobile Application

Software that is designed to run on mobile devices, such as smartphones and tablets.

Signup and view all the flashcards

Platform as a Service (PaaS)

A service that allows users to access and use operating systems and database management systems over the internet.

Signup and view all the flashcards

Infrastructure as a Service (IaaS)

A model of cloud computing where users rent computing resources like servers and storage over the internet.

Signup and view all the flashcards

Form Wizard

A method of creating forms in MS Access that guides users through a series of steps to create a form.

Signup and view all the flashcards

Mobile Push Notification

A service that allows sending notifications from a server to a client, especially on mobile devices.

Signup and view all the flashcards

Cloud Technologies

A technology that allows users to process and store information of various formats using the internet.

Signup and view all the flashcards

International Telecommunication Union (ITU)

An international organization that focuses on telecommunications and radio.

Signup and view all the flashcards

Account

A digital profile that stores personal information and settings, accessible through an online service.

Signup and view all the flashcards

Google Presentation

A software program that allows users to create, share, and edit presentations online.

Signup and view all the flashcards

What does "AutoNumber" do in an "ID" field?

The "AutoNumber" data type in an "ID" field automatically assigns unique sequential numbers to each new record, starting from 1 and incrementing by 1 for every new entry.

Signup and view all the flashcards

What is the Database Window in Access?

The "Database Window" displays all the objects within your Access database, such as tables, queries, forms, reports, etc.

Signup and view all the flashcards

What are the commands found in the "Database Tools" tab?

The "Database Tools" tab in Access provides commands related to database management, including creating macros, controlling object visibility, performing analysis, and moving data between tables.

Signup and view all the flashcards

What does 'sorted in increasing order' mean?

Data sorted in ascending order means arranging the values from smallest to largest, alphabetically from A to Z, or chronologically from earliest to latest.

Signup and view all the flashcards

What does the logical operator "NOT" do in Access?

The logical "NOT" operator in Access is used to filter records by excluding values that meet a specific condition. It essentially selects records that don't match a given criteria.

Signup and view all the flashcards

How does "NOT" work with a wildcard "T"?

The "NOT" operator in Access used with a wildcard "T" will select words that don't start with the letter "T".

Signup and view all the flashcards

What does the wildcard "*" combined with a letter do?

The wildcard "" in Access is used to find words that begin with a specific letter (in this case, "C"). The wildcard "" represents any character that can follow the letter "C".

Signup and view all the flashcards

What does the range operator "[ ]" do?

The range operator "[ ]" in Access is used to search for words that start with any of the specified letters within the square brackets. In this case, the query would select words starting with "B", "C", or "D".

Signup and view all the flashcards

Stealth Virus

A type of virus that attempts to hide its presence on a computer system.

Signup and view all the flashcards

Scanning for Viruses

A method of finding out if a computer is infected with a virus. It involves scanning for suspicious patterns in files and comparing them to known virus signatures.

Signup and view all the flashcards

How Viruses Infect

Viruses can infect computers by executing an infected program. This means running or opening a file that contains malicious code.

Signup and view all the flashcards

Detector Programs

Programs designed specifically to find, identify, and remove computer viruses.

Signup and view all the flashcards

Doctor Programs

Programs specifically designed to treat or remove viruses from infected computer systems.

Signup and view all the flashcards

What is a Computer Virus?

A computer virus is essentially a small program that usually replicates itself and spreads to other programs or files. It can cause various problems and damage on a computer system.

Signup and view all the flashcards

Types of Computer Viruses

There are two main categories of viruses: resident and non-resident. Resident viruses stay in memory and infect other programs, while non-resident viruses only affect specific files.

Signup and view all the flashcards

Interceptor Viruses

Type of virus that exploits errors and vulnerabilities in software to infect systems. They often rely on bugs or flaws in the application's code.

Signup and view all the flashcards

PaaS

A platform as a service (PaaS) provides a cloud-based environment for software development and deployment. It offers tools, services, and resources like databases, servers, and programming languages, allowing developers to focus on building applications without managing the underlying infrastructure. Think of it like a pre-configured kitchen where everything is ready for cooking, but you still need to bring your recipes and ingredients.

Signup and view all the flashcards

What is GPS?

The Global Positioning System (GPS) is a satellite-based navigation system that provides location and time information worldwide. It uses a network of satellites to pinpoint your exact location, allowing for navigation and mapping.

Signup and view all the flashcards

What's GSM?

The Global System for Mobile Communications (GSM) is a standard for mobile telecommunications networks, enabling voice calls, text messaging, and data transmission. It's a foundation for most mobile networks globally, allowing people to connect across different devices.

Signup and view all the flashcards

What are Google services?

Google services encompass a wide range of online tools and resources provided by Google, including email (Gmail), search, maps, cloud storage (Google Drive), video streaming (YouTube), and social networking (Google+). They are designed to enhance communication, information retrieval, and productivity.

Signup and view all the flashcards

What is Cybersecurity?

Cybersecurity encompasses measures and strategies to protect information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing security controls, policies, and technologies to mitigate risks and ensure the confidentiality, integrity, and availability of sensitive information.

Signup and view all the flashcards

What are Computer Viruses?

Computer viruses are malicious software programs designed to disrupt or harm computer systems. They can spread through email attachments, websites, or infected files, replicating themselves and causing various problems like data loss, performance issues, or system crashes.

Signup and view all the flashcards

What are Antivirus programs?

Antivirus programs are software applications designed to detect and remove computer viruses, malware, and other threats. They work by scanning files and systems for suspicious code patterns, blocking attempts to infect the system, and removing existing threats.

Signup and view all the flashcards

What are Executable files?

Executable files are the program files that can be run by the computer. They have specific file extensions like '.exe', '.com', or '.bat', indicating they contain instructions that a computer can execute.

Signup and view all the flashcards

Computer Virus

A type of malicious software that can replicate itself and spread to other files or systems, often causing harm to the computer or network.

Signup and view all the flashcards

Computer Infection

The process of a virus entering a computer system, typically through actions like opening infected files, clicking suspicious links, or downloading malicious software.

Signup and view all the flashcards

Simple Swap Cipher

The process of rearranging letters in a message to create a secret code, often used for encryption.

Signup and view all the flashcards

E-Government Stages

A series of steps or stages that a government takes to integrate technology and digital services into its operations for better service delivery and citizen interaction.

Signup and view all the flashcards

Kazakhstan E-Government Program (2005-2007)

A program implemented in Kazakhstan between 2005 and 2007 to develop and expand the use of e-government services.

Signup and view all the flashcards

E-Government Services

The use of information and communication technology (ICT) to deliver services and information to citizens, businesses, and other government agencies.

Signup and view all the flashcards

E-Service Providers

Entities or organizations providing services via ICT tools, contributing to the growth of e-government.

Signup and view all the flashcards

Government-to-Consumer (G2C)

The interaction between citizens and the government using electronic means.

Signup and view all the flashcards

Government-to-Government (G2G)

The interaction between the government and other government agencies using electronic means.

Signup and view all the flashcards

Government-to-Business (G2B)

The interaction between the government and businesses using electronic means.

Signup and view all the flashcards

Business-to-Consumer (B2C)

The interaction between businesses and citizens using electronic means.

Signup and view all the flashcards

Business-to-Government (B2G)

The interaction between businesses and the government using electronic means.

Signup and view all the flashcards

E-Learning

The use of electronic means to access information, communicate, and learn remotely, often used for education.

Signup and view all the flashcards

Distance Learning Occupations Forms

The different ways individuals can participate in E-Learning, including online chats, web-based activities, and video conferences.

Signup and view all the flashcards

Study Notes

Information and Communication Technology (Alpha-Q) Study Notes

  • This document contains study notes for an Information and Communication Technology exam, covering MS Access and related topics.
  • Operations with data: Data arrangement, sorting, archiving, organization, transmission, and formalization are covered.
  • MS Access functions: Commands in the Datasheet tab, intended for table manipulation and database creation, are detailed.
  • Connected fields in MS Access:
    • Different types of data in two files.
    • Single file with different data types.
    • Different names with different data types.
    • Same names with different data types.
    • Different names with the same data types.
  • MS Access "Create" tab: This tab enables splitting of tables, querying, creating reports, forms, templates, and database modules.
  • MS Access table structure: Functions to change the table structure, including the table wizard, design view, and datasheet view, are discussed.
  • MS Access major database objects: Tables, forms, reports, queries, and macros are included, focused on their use for displaying information effectively.
  • Copying records in MS Access: A method is provided, explaining the process of copying selected records through specific commands.
  • AutoNumber function: The function automatically inputs sequential numbers in specified fields.
  • MS Access working area: Elements like desktop, task area, menus, toolbars, database window, and other objects are mentioned.
  • Database tools tab: This tab contains commands for working with forms, reports, queries, analysis, and more.
  • Record sorting: Methods for sorting records in ascending and descending order are provided.
  • Data extraction: Data retrieval from tables is described focusing on queries for proper data presentation.
  • Query usage: Operations like storing a database, establishing relationships, presenting data for printing, and renaming documents within queries are included.
  • Forms usage: Formatting for printing, extracting data, presenting data on screen, and accepting user inputs for data are covered.
  • Database fields: The concept, related values, description of records, and criteria are detailed.
  • Database tables: Their use for data storage is highlighted.
  • Data retrieval and sorting methods: Different methods, like selecting records and performing commands for copying, are discussed.
  • Data sorting and filtering: Commands for sorting and filtering data in different views are explained.
  • General database structure: Concepts like tables, forms, queries, reports, and more, along with their functions and relationships, are explained for comprehending database structure and use.
  • Data types: Text, numerical, and others are explained.
  • Methods of creating and manipulating data: Information, such as sorting, filtering, copying records, and more, are described to better understand database use.
  • Database sorting: Ascending and descending order sorting commands for various database views are noted.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on computer viruses and their detection methods, as well as the functionalities of MS Access. This quiz covers key concepts such as the characteristics of viruses, capabilities of anti-virus software, and various features within MS Access. Challenge yourself with questions that span major topics in computer science.

More Like This

Use Quizgecko on...
Browser
Browser