A | B |
A computer program written to alter the way a computer operates without the permission of the user | Virus |
Has the appearance of being a useful and desired function, but secretly it performs undesired functions | Trojan Horse Virus |
This unwanted program replicates itself after it has entered the computer. | Worm Virus |
This virus loads each time the computer is restarted. | Bootsector Virus |
An application virus that attacks programming language, allowing it to target documents such as Microsoft Word or Excel. | Macrovirus |
This virus is programmed to initiate when a certain set of data is input into the computer. | Logic Bomb |
When people try to get your personal information through bogus sites that are pretending to be legitimate sites. | Phishing |
When people try to gain unauthorized access to your computer system without your knowledge. | Hacking |
The common name of software that is given to the user with advertisements embedded in it. | Adware |
Any software that covertly gathers user information through the user's Internet connection without his or her knowledge | Spyware |
Is virus protection hardware or software? | Software |
Software that provides a barrier protection between networks. | Firewall |
This control limits the types of sites that can be viewed. | Filter |
This software IS NOT copyrighted and can be used for free at any time. | Public Domain |
This software IS copyrighted but can be used for free at any time. | Freeware |
This software IS copyrighted but can be used for free for a limited time and then must be purchased. | Shareware |
True or false: Adware, Viruses, and Spyware are all types of Malware. | True |
A virus that lurks in the computer, waiting for a specific date/time to activate it, what type of virus is it. | Time Bomb |