Podcast
Questions and Answers
Hacker is just a clever programmer who uses their computer skills to gain unauthorised access to other person's confidential data such as credit card number, password, or personal information. Malware is short form of __________ software.
Hacker is just a clever programmer who uses their computer skills to gain unauthorised access to other person's confidential data such as credit card number, password, or personal information. Malware is short form of __________ software.
malicious
Hackers use malware to steal personal information or passwords, corrupt data, or take over a system. Two common types of malware include computer __________.
Hackers use malware to steal personal information or passwords, corrupt data, or take over a system. Two common types of malware include computer __________.
viruses
Computer viruses are usually attached to executable files (exe) and macro scripts in documents and spreadsheets. Once users run the infected program, the virus will damage the data and gain control of the computer. A virus can spread across computers through networks by making copies of itself. Viruses are usually hidden in commonly used programs, such as email attachments or files you downloaded from the ________.
Computer viruses are usually attached to executable files (exe) and macro scripts in documents and spreadsheets. Once users run the infected program, the virus will damage the data and gain control of the computer. A virus can spread across computers through networks by making copies of itself. Viruses are usually hidden in commonly used programs, such as email attachments or files you downloaded from the ________.
internet
Trojan horse is a malware that disguises itself as a useful application. When a user runs a trojan horse, it allows hackers to infiltrate your computer system, remotely controlling your device and steal your information including browsing habit or history, HKID card number, mobile numbers, and ________.
Trojan horse is a malware that disguises itself as a useful application. When a user runs a trojan horse, it allows hackers to infiltrate your computer system, remotely controlling your device and steal your information including browsing habit or history, HKID card number, mobile numbers, and ________.
Signup and view all the answers
Unlike computer viruses, trojan horse doesn't ________ themselves.
Unlike computer viruses, trojan horse doesn't ________ themselves.
Signup and view all the answers
Protection against malware includes installing antivirus software and keeping the virus signature most updated. Antivirus software keeps our computers safe by scanning our files and isolating those ________.
Protection against malware includes installing antivirus software and keeping the virus signature most updated. Antivirus software keeps our computers safe by scanning our files and isolating those ________.
Signup and view all the answers
A hacker is a clever programmer who uses their computer skills to gain unauthorized access to other person's confidential data such as credit card numbers, passwords, or personal information. Malware is a short form of malicious ________.
A hacker is a clever programmer who uses their computer skills to gain unauthorized access to other person's confidential data such as credit card numbers, passwords, or personal information. Malware is a short form of malicious ________.
Signup and view all the answers
Hackers use malware to steal personal information or passwords, corrupt data, or take over a system. Two common types of malware include computer ________.
Hackers use malware to steal personal information or passwords, corrupt data, or take over a system. Two common types of malware include computer ________.
Signup and view all the answers
Computer viruses are usually attached to executable files (exe) and macro scripts in documents and spreadsheets. Once users run the infected program, the virus will damage the data and gain control of the computer. A virus can spread across computers through networks by making copies of itself. Viruses are usually hidden in commonly used programs, such as email attachments or files you downloaded from the ________.
Computer viruses are usually attached to executable files (exe) and macro scripts in documents and spreadsheets. Once users run the infected program, the virus will damage the data and gain control of the computer. A virus can spread across computers through networks by making copies of itself. Viruses are usually hidden in commonly used programs, such as email attachments or files you downloaded from the ________.
Signup and view all the answers
Trojan horse is a malware that disguises itself as a useful application. When a user runs a trojan horse, it allows hackers to infiltrate your computer system, remotely controlling your device and steal your information including browsing habits or history, HKID card number, mobile numbers, and ________.
Trojan horse is a malware that disguises itself as a useful application. When a user runs a trojan horse, it allows hackers to infiltrate your computer system, remotely controlling your device and steal your information including browsing habits or history, HKID card number, mobile numbers, and ________.
Signup and view all the answers