0% found this document useful (0 votes)
10 views3 pages

HW10

тест 10

Uploaded by

france.3620
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

HW10

тест 10

Uploaded by

france.3620
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Ex 3 p 124

1) To transfer program control to the virus

2) The Misdirection, Reproduction, Trigger and Payload routines

3) It returns control to the program as originally written

Ex 5 p 125

1) They reproduce inside a host which they damage or destroy

2) It can copy itself into any program files

3) They can stay dormant in the memory until triggered

4) Displaying a message on the monitor screen or deleting files on the hard disk

5)COM or EXE programs

6) 1с, 2b, 3d, 4a

7) A Trojan has a payload but no reproduction routine

Ex 6 p 125

1) When a dismissed employee’s name is deleted from the company’s payroll, a logic bomb is

activated which causes the payroll records to be destroyed

2) When a certain date occurs, a trigger routine is activated which makes keys beep when

pressed and corrupts floppies

3) When the operator starts up the computer for the 129 time, a trigger routine is activated

which causes the screen to display ‘Bloody! June 4, 1989’

4) When the infected program is run, the boot sector is corrupted which causes the disk

content to be overwritten and data to be lost

5) When a particular date occurs, the payload is triggered which makes characters on a text

mode screen slide down to the bottom

6) When an infected document is opened in the wordprocessor, the virus macro is executed

which attaches the virus code to the default template. When the user saves another document,

the virus code attaches to the saved document. When the saved document is opened in the

wordprocessor, the virus destroys data, displays a message or plays music

Ex 7 p 127

1) A MIDI message encodes sound as 8-bit bytes of digital information

2) The teacher is using a new program to encourage children to write storis

3) The new version of SimCity has been enhanced in many ways

4) A gateway enables dissimilar networks to communicate


5) You can encode data to make it secure

6) Ensure the machine is discontinued before you remove the case

7) Designers can offer good ideas for brightening your website

8) Electronic readers allow you to enlarge the print size

9) Programmers write software which enables the computer to carry out particular tasks

10) You can widen the picture on your monitor

Ex 8 p 128

1) f

2) h

3) c

4) a

5) e

6) g

7) b

8)d

9) j

10) i

Ex A p 130

1) a

2) c

3) public-key cryptography

4) decrypt

5) b

6) information about the company operating the server and the server’s public key

Ex B1 p 131

1) c

2) d

3) b

4) a

Ex B2 p 131

1) d

2) e
3) a

4) b

5) f

6) c

Ex 3 p 129

A) False

B) True

C) False

D) False

E) False

F) False

G) True

H ) True

Ex 4 p 129

C, D, B, A

You might also like