You are on page 1of 3

NETWORK AND OPERATING SYSTEM

PRELIMINARY EXAM

Name:____________________________________________ Date:___________Score:___________

I - FILL IN THE BLANKS:

1. The first computer virus was invented in 1983 by _____________ as an innocent experiment in
computer security.
2. A ________________ is a program (a clock of executive code) which attaches itself to overwrite or
otherwise replaces another program in order to reproduce itself without the knowledge of the PC user.
3. THE FIRST destructive virus that spread fast was called the ______________ because it was first noticed
at the Hebrew University of Israel in 1987.
4. A pleasant-seeming program that secretly contains virus is called _____________.
5. The damage done by virus is called the virus _____________________
6. A ______________________ is just an e-mail message that contains a scary incorrect rumor or warns
you to “pass the message to all your friends”. It is not a program; its just a document.
7. A _______________________ virus secretly attaches itself to an innocent program, so the innocent
programs become infected.
8. A virus that hides on a reboot-sector is called _______________________.
9. A virus that comes as an e-mail attachment is called ______________
10. ____________________ is a virus that is commonly embedded in Microsoft Word and Microsoft Excel.

II - MULTIPLE CHOICE: Write only the letter of your answer in all big letter. Write your answer on the space
provided.

11. _______A computer virus is:


a. Anything that can infect, damage or hijack a PC, and generally make life difficult for its user.
b. A computer program that replicates itself when a host program or disk is run.
c. When so much dust accumulates in your computer's fans that they stop spinning.
12. _______A computer worm is:
a. A self-replicating program that uses networks to move around without human aid.
b. A virtual slimy thingy that lives in virtual dirt in the online virtual world Second Life.
c. A benign program that spreads via floppy and optical disks and simply resides on the infected
computer.
13. _______Programs designed to perform specific tasks is called known as
a. System software
b. Application software
c. Utility programs
d. Operating system

14. _______A Trojan , in computing terms, is:


a. A game from the 1990's that doesn't run on Windows 7.
b. An e-mail attachment or Internet download that seems to be harmless, but which, if opened or run,
secretly installs malicious software.
c. Something you're embarrassed to buy at the drugstore.
15. _______The most important advantage of a video disk is
a. Compactness
b. Potential capacity
c. Durability
d. Cost effectiveness

16. _______What, exactly, is malware?


a. Open-source programs whose roots go back to a genius named Yosef Mal, who unfortunately
passed away in 2003.
b. Software you'd like to have, such as Photoshop, but which costs way too much money to justify
without a career in the appropriate field.
c. Any kind of malicious software, including harmful viruses, Trojans and worms.
17. _______The first microprocessors produced by Intel Corpn. and Texas Instruments were used primarily
to control small
a. microwave ovens
b. washing machines
c. calculators
d. Personal computers
e. robotics
18. _______The most common way to invite malware into your computer is by:
a. Inserting a floppy disk.
b. Opening attachments in e-mail messages from unfamiliar senders.
c. Writing your own malware and executing it on your computer.
19. _______Human beings are referred to as Homo sapiens. Which device is called Silico sapiens?
a. Monitor
b. Hardware
c. Robot
d. Computer
20. Which of the following is not currently a topic in computer science?
a. Speech recognition
b. Artificial intelligence
c. Thermodynamics
d. Multiprocessing
21. _______What is another way for saying a computer virus?
a. Evil things
b. Secret spys
c. Malicious software
d. Malicious program
22. _______Which of the following holds data and processing instructions temporarily until the CPU needs
it?
a. ROM
b. Control unit
c. main memory
d. coprocessor chips
23. _______What can a computer virus do?
a. Delete file
b. Change passwords
c. Crash your computer
d. Give you loads of pop up
24. _______What does DDoS stand for?
a. A victory for wildlife lovers: When those "darned deer on steroids" fight back against hunters.
b. A "distributed denial of service" attack: One or more hackers activate secretly installed programs on
thousands, if not millions, of Internet-connected "zombie" computers to overwhelm a website with
junk data.
c. The latest version of Microsoft DOS, ignored by almost everybody. The extra "D" stands for Dynamic.
25. _______As compared to diskettes, the hard disks are
a. more expensive
b. more portable
c. less rigid
d. slowly accessed
26. _______A Trojan horse is something you download thinking it’s going to be useful, but is secretly evil –
like software that claims to be a Microsoft update but actually erases all your pictures. What epic poem
goes into detail about the original Trojan horse?
a. The Iliad
b. The Aeneid
c. Paradise Lost
d. Trojan Women
27. _______What is meant by a dedicated computer?
a. Which is used by one person only
b. Which is assigned one and only one task
c. Which uses on kind of software
d. Which is meant for application software only
28. _______The software used to convert source program instructions to object instruction is known as
a. Compiler
b. Assembler
c. Interpreter
d. Language processor
29. _______How do you remove all Viruses from Computer?
a. Anti Virus
b. Format
c. Delete
30. _______What is the name given to the molecular-scale computer?]
a. Femtocomputer
b. Nanocomputer
c. Supercomputer
d. Microcomputer

III - ENUMERATION:

1-6 Five software that can be used against viruses


7-11 Five Anti-Virus Measures
12-18 Seven kinds of Viruses
19-21 Three of some virus symptoms.
22-25 Common Routes for virus infiltration
26-28 Operating Systems’ Components
29-30 File Management System for an Executable Program

TRIVIA:

Computers only understand two digits, what are these? (5pts.)

You might also like