0% found this document useful (0 votes)
41 views2 pages

Assignment 2

The document contains a student activity sheet with multiple choice questions about computer viruses, malware, and computing concepts. The questions cover topics like the differences between viruses and worms, types of malware, functions of antivirus and anti-spam software, computing terms like downloading and uninstalling, keyboard shortcuts, and more.

Uploaded by

yvonne monida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views2 pages

Assignment 2

The document contains a student activity sheet with multiple choice questions about computer viruses, malware, and computing concepts. The questions cover topics like the differences between viruses and worms, types of malware, functions of antivirus and anti-spam software, computing terms like downloading and uninstalling, keyboard shortcuts, and more.

Uploaded by

yvonne monida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

NURSING INFORMATICS

Student Activity Sheet


Module #5

Name: Yvonne Marie Monida Date: March 26, 2024


Course & Year with Block: BSN 2 – BLOCK 2

DIRECTIONS: Answer the following multiple-choice questions and provide the rationale for each item.

1. What is the difference between a worm and a virus?


A. A worm is self-replicating but a virus isn't self-replicating
B. A virus is self-replicating but a worm isn't self-replicating
C. A virus runs in response to an event such as a date, but a worm runs on its own schedule
D. A worm runs in response to an event such as a date, but a virus runs on its own schedule
Answer: A
Rationale: A worm can self-replicate and spread to other computers, while a virus cannot. A virus needs
to be sent from one computer to another by a user or via software.

2. What type of malware do users inadvertently install with USB thumb drives?
A. Spam
B. Trojans
C. Buffer overflow
D. Logic bomb
Answer: B
Rationale: Users can unknowingly transfer and install Trojan horse malware onto their systems
with USB thumb drives.

3. What can reduce unwanted email that contains advertisements?


A. Anti-spam software
B. Antivirus software
C. File integrity checkers
D. Botnet software
Answer: A
Rationale: Anti-spam software can filter out unwanted or unsolicited e-mail also called spam.

4. What type of signature-based monitoring can detect and remove known worms and Trojans?
A. Anti-spyware
B. NIDS
C. NIPS
D. Antivirus
Answer: D
Rationale: Antivirus software monitors a system and can detect and remove known malware including
worms and Trojans.

5. A user's computer has recently been slower than normal and has been sending out email without user
interaction. Of the following choices, what is the best choice to resolve this issue?
A. Botnet software
B. Anti-spam software
C. Anti-spyware software
D. Antivirus software
Answer: D
Rationale: Antivirus software can resolve many types of malware infections and this activity indicates an
infection possibly related to a botnet.

6. A process that transfers files from a remote computer to your PC.


A. Download
B. Upload
C. Installing software
D. Uninstall software
Answer: A
Rationale: The process of copying files from a remote server to a local drive is as known as downloading.

7. Removes a specific program file from the hard disk, removes the program name from the all programs
menu, and updates the windows registry.
A. Download
B. Upload
C. Installing software
D. Uninstall software
Answer: D
Rationale: Removes a specific program files form the hard disk, removes the program name from the all
programs menu, and updates the windows registry.
8. A form of legal protection that grants the author of an original work and exclusive right to copy,
distribute, sell, and modify that work, except under special circumstances.
A. License
B. Copyright
C. Ownership
D. Author
Answer: B
Rationale: A copyright is a form of legal protection that grants the author of an original work and
exclusive right to copy, distribute, sell, and modify that work, except under special circumstances.

9. The process of setting up software to work with the computer, printer and other hardware components.
A. Download
B. Upload
C. Installing software
D. Uninstalling software
Answer: C
Rationale: Installing software involves the process of setting up the software to work with the computer,
printer, and other hardware components

10. Displays icon menu of main options.


A. Toolbar
B. Task bar
C. Status bar
D. Handle bar
Answer: A
Rationale: A toolbar is a graphical control element that displays icons representing main options or
functions within a software application.

11. What key is often used to access commands?


A. Control key (Ctrl)
B. Alternative Key (Alt)
C. Shift Key
D. Enter
Answer: A
Rationale: The Control key (Ctrl) is often used in combination with other keys to access commands or
perform specific functions in various software applications.

12. What shortcut key combination would you use if you want to minimize all windows?
A. Win Key + M
B. Win Key + Tab
C. Win Key + Shift + M
D. Win Key + F1
Answer: A
Rationale: Pressing the Windows key (Win Key) along with the letter 'M' minimizes all open windows on
the desktop.

13. What does the key combination Win Key + F do?


A. Undo Minimize
B. Display the Windows Search/Find feature
C. Open the run window
D. Lock the computer
Answer: B
Rationale: Pressing Win Key + F opens the Windows Search or Find feature, allowing users to search for
files and folders on their system.

14. What statement is not true while double clicking?


A. Double clicking will make the alignment of the text either left, center or right aligned
B. Double clicking selects the line or paragraph of the text
C. Double clicking on a line will set a tab stop
D. Double clicking selects the complete word
Answer: C
Rationale: Double-clicking is generally used for selecting words, lines, or paragraphs and does not set
tab stops. Setting tab stops is typically done through specific formatting options in text editing software.

15. What is untrue about the boot sector virus?


A. it infects other programs when the infected program is run or executed
B. It infects the section of a disk that is first read by the computer
C. It infects the boot or master section of any disks that comes in contact with it
D. All is true
Answer: C
Rationale: The untrue statement about the boot sector virus is C. It infects the boot or master section of
any disks that come in contact with it. Boot sector viruses typically infect the boot sector of a specific type
of disk (such as a floppy disk or the Master Boot Record of a hard drive) when that disk is accessed or
executed, but they do not infect every disk that comes in contact with them

You might also like