You are on page 1of 3

1-Viruses is a………….. computer program.

• Self-duplicating.
• Spread fast.
• Active.
• All of them correct.

2-The noun of the word (destructive) is:

• Destroy.
• Destruction
• Desturbed.
• Non of them.

3-The viruses be activated when the instruction or executable code is:

• Open.
• Turned off.
• Both are correct.
• Both are false.

4-When the viruses replicate themselves, it infects the computer's……….

• Opreating system.
• Files.
• Both are correct

5-Viruses have diffrenet ways to infect the computer. All the following is correct except:

• Copy parts of itself to floppy disk.


• When the computer be opend.
• Attach itself to e_mail message.
• Spread across computer network.

6-The verb of (infection)is:

• Infected.
• Infect.
• Infectious.
• Non of them.

7-Kind of viruses attached to e_mail message:

• Hackers.
• Worm.
• Crime tools.
• Piracy.
9-Hakers are people who intentionally……..

• Creat viruses.
• Engage in software piracy.
• Deface website.
• All of them correct.

10-One of the crime tools that tries millions of combination of characters is……

• Vulnerability.
• Password guessers.
• Automatic computer virus generatoe.

11-Vulnerability means:

• Software strength.
• Software weakness.
• Viruses generator.

12-Peopke who develop powerful software crime tools are:

• Hakers.
• Exports.
• Programmer.
• All of them.

13-Thousandsof………….. exist and can quicly contaminate millions of computers:

• Viruses.
• Worms.
• Both.
• Non.

14-Hakers develop powerful software crime tools such as:

• Password guessers.
• Vulnerability.
• All of them.
• Computer services saturator.

15-Vulnerability testers look for…………. Weakness.

• Hardware.
• Software
• . Programs
• .All of them.

*true or false.

1-Viruse is not a self duplicating.

2-viruses are only irritating but not destructive.

3-the adjective of infect is not infected only.

4-viruses can be active even when programs are closed.

5-viruses can be infected to operating system only.

6-once a viruses are active, it may not replicate.

7-viruses stop when the attached to e_mail message.

8-worms and viruses exist and can slowly contaminate millions of computer.

9-password guessers look for software weakness.

10-the virus can infect by one way which is copy itself.

11-piracy is one kind of crime tools.

12-hackers can guesse the password by tring to deface your computer.

13-virus can infect part of local network in minutes.

14-when the viruse spread across computer network, it does not infect other shared drives.

15-viruses and worms are easy to deal whit, so you do not need to be worried if they exist in your computer.

#the whole sentences are false.


‫أصالة خالد العرجزي‬
‫إيمان التركي‬
‫نوال الضيعاني‬
‫االء الداوي‬
‫وجدان الحطوار‬

You might also like