Computer Literacy
If you encounter a Trojan Horse what has happened? You read a fake email from a bank that appears to be asking for personal information. Someone has stolen your credit card and used it to purchase items online. A hacker placed a program in your computer that granted illegal access to your files. You have installed a virus protection program on your computer.
Question 2. 2. Which of the following is an example of computer phishing?
A fraudulent email from a bank asking for account information.
A virus that infects your computer and sends out information.
A software error in your computer and causes it to crash.
A computer hacker that breaks into your computer.
Question 3. 3. The term "computer literacy" dates back to what decade? (Points : 1)
1960s
1970s
1980s
1990s
Question 4. 4. A computer worm is MOST likely to attack your computer's: (Points : 1)
printer.
scanner.
memory.
monitor.
Question 5. 5. Many people describe computers as "complex" machines. What can this mean? (Points : 1)
Computers are smarter than humans.
Computers are understood by very few people because of their intricate technical components .
Computers run software programs with hard to use features.
Computers have had both a positive and negative effect on society.
Question 6. 6. Which of the following is NOT an example of systems software? (Points : 1)
Operating systems
Utilities
Device drivers
Applications
Question 7. 7. Which action BEST describes a branch in a computer program?
It jumps to a non-sequential line number.
It moves
one line number ahead.
It moves one line number backwards.
It stays on the same line number and calculates new data.
Question 8. 8. In the 1970s which company developed computer innovations such as the mouse, graphical user interface, and word processors?
Microsoft
IBM
Xerox
Apple
Question 9. 9. Which of the following is an operating system?
Microsoft
MAC
Apple
Windows
Question 10. 10. Which of the following components was a significant development featured in the Macintosh LISA computer?
C Prompt
Disk Operating System
Graphical User Interface
Memory