Question 1) EDI stands for:
A. Electronic data information
B. Electronic data intercommunication
C. Electronic data interchange
D. Electronic date interchange
Question 2) The production of high quality publications by publishers is best made using:
A. Word-Processor
B. A DTP software
C. An Expert System
D. A 4GL
Question 3) A _____ scanner is a scanner that is moved by hand in order to scan:
A. Sheet feed
B. Hand-held
C. Flatbed
D. None of the above
Question 4) The most significant step in implementing a security strategy is:
A. Computer
B. Security Awareness
C. Cost
D. People
Question 5) A frustrated employee who cracks her manager’s password in order to access confidential data is called as:
A. Internal Threat
B. External Threat
C. Outer Threat
D. None of the above
Question 6) ______ are caused intentionally by users of computer system:
A. Non-Malicious Threat
B. Malicious Threat
C. Both of the above
D. None of the above
Question 7) Malicious threats can also be called as:
A. Firmware
B. Software
C. Maliciousware
D. Malware
Question 8) What are the symptoms in detecting virus infection on your computer:
A. Programs quit working or freeze
B. Documents become inaccessible
C. System seems to run slower than normal
D. All of the above
Question 9) _____ hides within code of another program and wreak havoc to any form of data on the machine:
A. File Infectors
B. Boot Sector Virus
C. Macro Virus
D. Micro Virus
Question 10) Which kind of virus causes damage and compromises security of computer when you open it:
A. Worm
B. Trojan Horse
C. Macro Virus
D. None of the above.