Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
МУ Компьтеры и операционные системы.Волкова 201...doc
Скачиваний:
10
Добавлен:
11.11.2019
Размер:
2.51 Mб
Скачать

7. Say if these sentences are true or false. If they are false give the correct statement.

1) There are a few different crimes that can be committed in computing.

2) Spreading viruses is distributing programs that can reproduce themselves and are written with the purpose of causing damage.

3) A computer virus is a program that can reproduce itself

4) A computer virus infects itself attaching to other programs.

5) A JUMP command is a command that changes the normal instruction sequence in a program.

6) Viruses normally attach themselves to application programs.

7) A virus is loaded into memory and then becomes memory resident.

8) When the virus is triggered, it operates all the programs on the computer.

9) A virus usually has two main parts.

10) A program that has a payload but does not have a reproduction routine is known as a Trojan.

8. Choose the correct answers:

    1. The different crimes can be __________ in the field of computing.

  1. made b) commited c) done

    1. Spreading viruses is distributing programs that can _________ themselves.

a) reproduce b) repeat c) create

    1. Viruses are written with the purpose of causing a computer to __________ in an unusual way.

a) compute b) look c)behave

4. Hacking means gaining __________ access to a network system.

a) unauthorized b) fast c) authorized

5. Salami shaving is manipulating programs or data so that small amounts of ________ are deducted from a large number of transactions or accounts and accumulated elsewhere.

a) money b) time c) memory

6. The victims of salami shaving are often unaware of the crime because the amount taken from any individual is so ________.

a) large b) small c) good

7. Denial of service ______ is swamping a server with large numbers of requests.

a) operation b) attack c) access

8. Trojan horse is a technique that involves adding concealed _________ to a computer program so that it will still work but will also perform prohibited duties.

a) programs b) routines c) instructions

9. In other words, it appears to do something useful but actually does something ____________ in the background.

a) destructive b) pleasant c) impressive

10. Trapdoors is a technique that involves leaving, within a completed program, an _________ program that allows unauthorised -and unknown – entry.

a) new b) illicit c) obvious

11. Mail bombing is inundating an email address with thousands of _____________, slowing or even crashing the server.

a) messages b) papers c) letters

12. Software piracy means unauthorised __________ of a program for sale or distributing to other users.

a) copying b) deleting c) installing

13. Piggybacking means using another person's identification code or using that person's files before he or she has ________.

a) switched off b) logged off c) turned on

14. Spoofing is tricking a user into revealing ______information such as an access code or a credit-card number.

a) proper b) illegal c) confidential

15. Defacing is changing the information shown on another person's ________.

a) computer b) screen c) website

16. Hijacking is anyone trying to visit a certain site elsewhere.

a) redirecting b) reproducing c) reporting

17. A computer virus is a very small routine that ______ a computer system and uses its resources to reproduce itself.

a) infects b) operates c) runs

18. A computer virus often infects a computer system by _________ the operating system.

a) detecting b) patching c) finding

19. A computer virus sometimes causes harm to the _____ computer system.

a) host b) original c) whole

20. When the user runs an infected program, it is loaded into memory carrying the virus.

a) memory b) cache c) buffer

21. The virus uses a common programming technique to stay ________ in memory.

a) dominant b) constant c) resident

22. A virus can then use a ________ routine to infect other programs.

a) trigger b) misdirection c) reproduction

23. The virus may also contain a payload that remains dormant until a ______ event activates it.

a) some b) trigger c) new

24. The payload can do something relatively harmless such as __________ a message on the monitor screen

a) displaying b) sending c) writing

25. The payload might also do something more destructive such as deleting files on _________ .

a) the hard disk b) the floppy disks c) folders

26. When it infects a file, the virus replaces the first instruction in the host program with a command that changes the normal _________ sequence.

a) running b) execution c) repair

27. This type of command is called a ______ command and causes the virus instructions to be executed before the host program.

a) EXE b) JUMP c) COM

28. The virus then returns ______to the host program which then continues with its normal sequence of instructions and is executed in the normal way.

a) control b) operation c) command

29. To be a virus, a program only needs to have a reproduction routine that _________ it to infect other programs.

a) does b) help c) enables

30. Viruses can, however, have ____ main parts.

a) four b) three c) five

31. A misdirection routine enables it to ________ itself.

a) lose b) hide c) provide

32. A reproduction routine allows it to ______ itself to other programs.

a) copy b) protect c) show

33. A trigger causes the ________ to be activated at a particular time or when a particular event takes place

a) program b) routine c) payload

34. A payload may be a fairly ______ joke or may be very destructive.

a) nice b) funny c) harmless

35. A program that has a payload but does not have a reproduction routine is known as a _______.

a) macro virus b) Trojan c) Love Bug