Computer Virus History Quiz
42 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of malware?

  • To enhance system performance
  • To back up data
  • To harm and infect the host system (correct)
  • To clean up software
  • Ransomware typically requires payment to regain access to a computer.

    True (A)

    Name one type of malware that self-replicates and spreads over a network.

    Worm

    Regular maintenance can help prevent ____ loss by ensuring your computer runs smoothly.

    <p>data</p> Signup and view all the answers

    Match the following types of malware with their descriptions:

    <p>Worm = Self-replicating malicious program Ransomware = Demands payment for access Scareware = Attempts to frighten users into purchasing software Adware = Pushes unwanted advertisements</p> Signup and view all the answers

    What should you do to keep your software running efficiently?

    <p>Schedule regular maintenance (B)</p> Signup and view all the answers

    List the three steps in maintaining computer systems.

    <p>Know your A, B and C's, Clean your hardware, Know what to fix</p> Signup and view all the answers

    Which type of computer uses continuous electrical signals for operation?

    <p>Analog computer (C)</p> Signup and view all the answers

    A digital computer operates on binary digits and can perform arithmetic operations.

    <p>True (A)</p> Signup and view all the answers

    What is one example of a hybrid computer and its application?

    <p>In a hospital ICU, analog devices measure a patient's heart function and temperature.</p> Signup and view all the answers

    A __________ is a dedicated computer that provides one or more services to other computers.

    <p>server</p> Signup and view all the answers

    Match the following examples to their respective computer types:

    <p>Petrol pump measurement system = Analog computer IBM PC = Digital computer Hospital ICU measurement devices = Hybrid computer Calculator = Digital computer</p> Signup and view all the answers

    Which of the following is NOT a sign of a malware or virus infection?

    <p>Increased battery life (C)</p> Signup and view all the answers

    Clicking on pop-up advertisements can help protect your computer from malware.

    <p>False (B)</p> Signup and view all the answers

    What should you do before opening email attachments?

    <p>Scan them with an antivirus program.</p> Signup and view all the answers

    To reduce the impact of viruses, it is important to regularly ______ data.

    <p>backup</p> Signup and view all the answers

    Match the backup methods with their descriptions:

    <p>External Hard Drive = High storage capacity for files Flash Drive = Ultra-portable USB storage Cloud = Online storage service Time Machine = Mac backup application</p> Signup and view all the answers

    What should you avoid to prevent malware?

    <p>Clicking on suspicious links (B)</p> Signup and view all the answers

    A blue screen with an error code is a common indication of malware presence.

    <p>True (A)</p> Signup and view all the answers

    What effect does a reliable antivirus program have on computer security?

    <p>It protects against malware and keeps the system up to date.</p> Signup and view all the answers

    Using a ______ can help you to store files online.

    <p>cloud</p> Signup and view all the answers

    What is one advantage of using a flash drive for backup?

    <p>Ultra-portability (C)</p> Signup and view all the answers

    What does the C: drive commonly refer to?

    <p>Hard disk drive (A)</p> Signup and view all the answers

    Folders are used to help organize files on a computer.

    <p>True (A)</p> Signup and view all the answers

    What is the purpose of the Delete command?

    <p>To remove files from the storage device.</p> Signup and view all the answers

    You can open File Explorer using the shortcut keys ______, E.

    <p>Windows (⊞)</p> Signup and view all the answers

    Match the cleaning tools with their appropriate use:

    <p>Damp cloth = Cleaning surfaces Dry lint-free cloth = Cleaning monitors Compressed air canister = Cleaning hard-to-reach parts LCD screen cleaner = Cleaning tough stains on screens</p> Signup and view all the answers

    Which of the following is NOT a suggested method for cleaning a computer?

    <p>Using solvents (D)</p> Signup and view all the answers

    It is acceptable to eat or drink over your computer while working.

    <p>False (B)</p> Signup and view all the answers

    Name one simple solution to troubleshoot most problems.

    <p>Closing and re-opening the program.</p> Signup and view all the answers

    A file path shows the ______ of where a file is located on the computer.

    <p>location</p> Signup and view all the answers

    Which of the following is an important step when troubleshooting computer problems?

    <p>Check all related cables (C)</p> Signup and view all the answers

    What type of computer is designed to perform specific tasks only?

    <p>Special Purpose Computer (D)</p> Signup and view all the answers

    Analog computers store statistics effectively.

    <p>False (B)</p> Signup and view all the answers

    What should you do when your computer gives you error messages?

    <p>Write down as much information as possible.</p> Signup and view all the answers

    A __________ computer can perform any job by changing the application program stored in its main memory.

    <p>General Purpose</p> Signup and view all the answers

    Match the type of computer with its description:

    <p>General Purpose Computer = Versatile and can perform various tasks Special Purpose Computer = Designed for a specific task Analog Computer = Uses continuous data for measurements Digital Computer = Processes discrete data in binary form</p> Signup and view all the answers

    Which of the following is NOT an example of a Special Purpose Computer?

    <p>Word Processor (C)</p> Signup and view all the answers

    The efficiency of an analog computer increases when output is obtained in graphs.

    <p>True (A)</p> Signup and view all the answers

    What is the main limitation of General Purpose Computers compared to Special Purpose Computers?

    <p>Limited ability to perform specialized tasks.</p> Signup and view all the answers

    Special Purpose Computers depend on their _____ and _____ for size, storage capacity, and cost.

    <p>nature, size</p> Signup and view all the answers

    Which of the following is an example of where an Analog Computer might be used?

    <p>Temperature measurements (A)</p> Signup and view all the answers

    Study Notes

    Computer Virus History

    • The first self-replicating computer program theory was developed in 1949 by John von Neumann.
    • He lectured at the University of Illinois.
    • He published work on "Theory and Organization of Complicated Automata"
    • He is considered the theoretical father of computer virology.

    The Creeper Virus

    • Created by Robert Thomas at BBN Technologies in 1971.
    • A self-replicating program.
    • Spread through the ARPANET.
    • Displayed the message "I'm the creeper, catch me if you can!" on infected systems.
    • The Reaper program was created to delete Creeper.

    Elk Cloner

    • The first personal computer virus outside a computer lab.
    • Created in 1981 by Richard Skrenta, a high school student.
    • Infected Apple II operating systems.
    • Spread via floppy disks.
    • Displayed a poem titled "Elk Cloner: The program with a personality".

    Computer Virus Term

    • Fred Cohen coined the term "computer virus" in 1984.
    • This was in a paper called "Computer Viruses Theory and Experiments".
    • Cohen's mentor Leonard Adleman was influential in this coinage.

    Other Major Viruses

    • Jerusalem: A DOS virus that deleted applications on Friday the 13th.
    • Melissa: A mass-mailing macro virus that caused significant disruption in 1999, resulting in its creator's imprisonment.
    • ILOVEYOU: A computer worm that spread rapidly via email, infecting millions of Windows PCs in May 2000. Created in the Philippines by Onel de Guzman.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the fascinating history of computer viruses, from John von Neumann's groundbreaking theories to the iconic Creeper and Elk Cloner viruses. This quiz covers key developments and notable figures in the world of computer virology.

    More Like This

    Use Quizgecko on...
    Browser
    Browser