Viruses copy themselves to other disks to spread to other computers. They can be merely annoying or they can be vastly destructive to your files.
Trojans hide inside something else to sneak in unwanted programs. You don't know that they are there, like the famous Trojan horse. These are often used to capture your logins and passwords.
Worms are unwanted programs that are transferred over network or Internet connections to spread themselves quickly.
Spyware programs lurk on your computer to steal important information, like your passwords and logins and other personal identification information and then send it off to someone else.
Zombie programs take control of your computer and use it and its Internet connection to attack other computers or networks or to perform other criminal activities.
Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing information like your social security number or bank account information or logon and password for a web site. The message may claim that if you do not click on the link in the message and log onto a financial web site that your account will be blocked, or some other disaster.
Spam is email that you did not request and do not want. One person's spam is another's useful newsletter or sale ad. Spam is a common way to spread viruses, trojans, and the like.
Browser hijacking occurs when one of the nasties takes control of your browser, sending you to sites that you did not mean to go to. This may be a porn site or it may look like a real banking, sales, or credit card site. The purpose is to steal your personal and financial information or to run up the number of page views for ads on the page so that the advertisers will pay them more money.
Programs that add protection:
Anti-virus programs monitor the computer for the activity of viruses and similar nasties.
Anti-spyware programs similarly monitor your computer, looking for known trouble-makers as well as suspicious behavior.
Anti-spam software tries to identify useless or dangerous messages for you.
A firewall blocks attempts to access your files over a network or internet connection. Your network router or modem or both may have a hardware firewall built into it. That will block incoming attacks. But you still need a software firewall on your computer to block outgoing attacks. Your computer can become infected through shared disks or even from another computer on the network. So you need to monitor what your computer is putting out over the network or internet also.
System Software: Quiz
For each question, click on the radio button beside your answer. You will be notified immediately whether your choice is correct or not. Double clicking may work better.
Top of Form
1. The operating system for a computer does the following:
manages the disks and files
manages the computer's resources
manages the computer's memory
all of the above
none of the above
2. Spooling helps because _____.
it is a more secure method of accessing data
print jobs go more smoothly with less stop and go
the computer is released to do other things while still printing
none of the above
3. A proprietary operating system is ____.
unique to a manufacturer
similar to those of other manufacturers
used by many different computer manufacturers
properly configured to operate
4. A computer's BIOS will ____
check for the presence of peripherals like mouse, sound card, scanner
defragments the hard disk
be loaded first when the computer is powered on
none of the above
5. Windows versions before Windows 95 _____
a. are proprietary operating systems
b. are not operating systems at all
c. rely on DOS as the operating system
d. were the first successful graphical operating systems
e. both a and d
f. both b and c
g. a, b, c, and d
6. A backup program _____.
makes a copy of files you select.
returns you to the previous program
undoes the last change you made
none of the above
7. An operating system or other program that has reached end-of-life in its life cycle will _____.
no longer work
still work but will not get new updates except for security updates
still work but will not get any updates or support at all
automatically upgrade to the next newest version
8. When a computer is "swapping", it is _____.
moving data from the hard drive to a removable drive
moving data from memory to the swap file on the hard drive
moving data between registers in memory
none of the above
9. A computer virus can be _____.
annoying only
damaging to your data
copied without your knowledge onto removable drives used in the infected computer
all of the above
10. A foreground task has more _____ than a background task.