IT Essentials Revision - 1 and 2
IT Essentials Revision - 1 and 2
A. Kilobyte
B. Byte
C. Gigabyte
D. Terabyte
3. The smallest unit of memory is called a:
A. Bit
B. Byte
C. Mb
D. KB
4. Which of the following is NOT an output device?
A. Keyboard
B. Printer
C. Speaker
D. Plotter
5. Which of the following is NOT an input device?
A. Keyboard
B. Printer
C. Digital Camera
D. Scanner
6. Which of the following devices has the highest storage capacity?
A. Zip disk
B. Floppy Disk
C. CD-R/CD-RW
D. Hard disk
1
7. Linux, Windows XP, and Vista are examples of:
A. Application software
B. Freeware
C. Operating System software
D. Hardware
8. Operating system software is used for:
2
13. A peripheral device is:
A. 1024 kilobytes
B. 1024 bytes
C. 1024 gigabytes
D. 1024 megabytes
15. How many bits are there to a byte?
A. 9
B. 6
C. 16
D. 8
16. Which of the following is an output device?
A. Keyboard
B. Scanner
C. Joystick
D. Plotter
17. Which of the following is both an input and output device?
A. Keyboard
B. Printer
C. Digital camera
D. Touchscreen
18. What prepares a disk for storing data?
A. Formatting
B. Backing up
C. Copying
D. Scanning
3
19. What would you use to manage files and folders?
A. Private Computer
B. Personal Computer
C. Personal Compact
22. Among the following, which term is related to memory?
A. WAN
B. MAN
C. CRT
D. RAM
23. BASIC, C and COBOL and Java are examples of which language?
A. Computer language
B. Low level language
C. System programming language
D. High-level language
24. An executed program that loads the first piece of software and starts a
computer.
A. Byte
B. Boot process
C. File Virus
D. System unit
4
25. Abbreviation for the binary term, a unit of storage capable of holding a single
character.
A. Output
B. Icons
C. Byte
D. Workstation
26. A collection of facts and data about a specific subject.
A. Icon
B. Information
C. Rom
D. Byte
27. Anything that comes out of a computer.
A. Handheld
B. Byte
C. Output
D. ROM
28. Which of the following is classed as hardware?
a. Keyboard
b. Desk top publishing
c. Spreadsheets
d. Presentation
29. Which of the following is a portable computer, enabling the user to work
remotely?
e. Desktop PC
a. Mainframe
b. Laptop computer
c. Server
30. A Megabyte (Mb) is:
a. 8 bits
b. 1024 bytes
c. 1000 Kilobytes
d. 1024 Kilobytes
5
31. Which of the following is NOT an input device?
a. Keyboard
b. Speaker
c. Mouse
d. Scanner
32. A Microphone is:
a. An output device
b. An input device
c. Both an input and output device
d. Neither an input nor output device
33. Which of the following is operating system software?
a. Word Processing/Database/Spreadsheets
b. Windows Explorer/My Computer/My Documents
c. Internet Explorer/Netscape/Outlook
d. Windows XP/Linux/IOS
34. The computer uses the .......... number system to store data and perform
calculations.
a. Binary
b. Octal
c. Decimal
d. Hexadecimal
e. None of these
35. A disk's content that is recorded at the time of manufacture and that cannot be
changed or erased by the user is:
a. Memory-only
b. Write-only
c. Run-only
d. Read-only
36. The contents of .......... are lost when the computer turns off.
a. Storage
b. Input
c. Output
d. RAM
6
37. Which is not a basic function of a computer?
a. Store data
b. Accept input
c. Copy text
d. Accept and process data
38. Which of the following is NOT a type of computer software?
(A) System software
(B) Application software
(C) Utility software
(D) Operating system
39. Which of the following is Not an input device?
a) Scanner
b) Keyboard
c) Monitor
d) Light Pen
40. A specialized software that allows user to utilize in a specific application is
classified as
a) Application software
b) Relative software
c) System software
d) Utility software
41. Which is the secondary memory of the computer?
a) CPU
b) Hard Disk
c) ROM
d) ALU
42. For comparison and calculations, the computer uses ____.
a) CPU
b) ALU
c) Control Units
d) Processors
43. Computers process data under the control of sets of instructions called____.
a) Computer data
b) Computer software
c) Computer buses
d) Computer instructions
7
44. A microprocessor unit, a memory unit, and an input/output unit form a ____.
a) Computer
b) CPU
c) Compiler
d) ALU
45. Which component is often referred to as the 'brain' of the motherboard?
a) BIOS
b) Processor
c) Computer Chip
d) Transistor
46. Which is not an example of a peripheral device?
a) Keyboard
b) Mouse
c) Register
d) Speakers
47. A program is a:
a) hardware device.
b) memory device.
c) set of instructions.
d) register.
48. Which is not found in the CPU?
a) ALU
b) Control unit
c) Memory
d) Printer
49. The ALU processes data and stores it in:
a) flash drive.
b) the main memory.
c) a sound card.
d) modem.
50. Which of these answer choices is the largest unit of data?
a) Megabyte
b) Bit
c) Kilobyte
d) Gigabyte
8
51. Which of these answer choices is the smallest unit of data?
a) Megabyte
b) Bit
c) Kilobyte
d) Gigabyte
52. Which of these storage devices can hold the most data?
a) Hard driver
b) RAM
c) DVD
d) Flash driver
53. Which data storage technology stores data temporarily, not permanently, for
use by a device?
a) DVD
b) ROM
c) RAM
d) Hard driver
54. _____ is used to begin the start-up process for your computer.
a) RAM
b) ROM
c) CPU
d) ALU
55. Which of the following best describes the CPU?
a) It the brain of the computer
b) It holds the volatile memory
c) It is the centrifugal processed unit.
d) It is the heart of the computer
56. A _____ allows you to enter data into a computer in the form of text.
a) Mouse
b) Keyboard
c) Device
d) Monitor
57. What are Output Devices?
a) Interprets and carries out the basic instructions that operate a computer
b) Any hardware component that allows you to enter data, commands, and
user responses into a computer.
c) Any computer component capable of giving information to the user.
d) Performs the execution part of the machine
9
58. Which of the following is not considered a storage media or device?
a) USB Flash Drive
b) Smart Card
c) Headphones
d) Cloud Storage
59. What is a printer?
a) Input Device
b) Output Device
c) Memory Storage or Media
d) A component of the system unit
60. What does CPU stand for?
a) Critical Processing Unit
b) Core Processing Unit
c) Common Processing Unit
d) Central Processing Unit
61. An example of the computer's hardware would be ...
a) MS Word
b) MS Publisher
c) Keyboard
d) IOS
62. What does the hard drive do?
a) Stores information temporarily
b) Gives Instructions
c) Stores information permanently
d) Drives through the computer
63. What is the most important piece of software on a computer?
a) Operating System
b) Programs
c) Applications
d) Hardware
64. Which of the following is the largest amount of storage?
a) 1.0 Terabyte
b) 1.0 billion bytes
c) 10,000 Gigabytes
d) 100,000 Kilobytes
10
65. ______________ is composed of 8 bits of information and represents every
letter, number, and symbol we use in the English language
a) Bit
b) Byte
c) File
d) Binary Numbers
True or False:
1. Hardware refers to physical components that you can see and touch. | True
2. There are 1024 Megabytes to a Terabytes. | False
3. The smallest unit of memory is called a bit. | True
4. A keyboard is an output device. | False
5. A printer is an input device. | False
6. A hard disk has the highest storage capacity. | True
7. Linux, Windows XP, and IOS are examples of operating system software. | True
8. Operating system software is used to perform mail merge procedures. | False
9. You should back up data to a removable storage device to protect loss of data in case
of fire or theft. | True
10. The speed of the CPU is measured in GHz. | True
11. A peripheral device is a device external to the computer but controlled by it. | True
12. A Terabyte is 1024 Gigabytes. | True
13. There are 8 bytes in a bit. | True
14. A scanner is an output device. | False
15. A touchscreen is both an input and output device. | True
16. Operating system software is used to manage files and folders. | True
17. A device driver is software that enables interaction with hardware devices. | True
18. PC stands for personal computer. | True
19. RAM is a type of memory. | True
20. The boot process is the process of loading the first piece of software and starting a
computer. | True
21. A byte is a unit of storage capable of holding a single character. | True
22. Information is a collection of facts and data about a specific subject. | True
23. Output is anything that comes out of a computer. | True
11
24. A keyboard is a hardware device. | True
25. ROM is a volatile memory. | False
26. A Megabyte is 1024 bytes. | True
27. A speaker is an input device. | False
28. A microphone is an output device. | False
29. Operating system software is software that controls the computer's hardware and
provides a platform for application software to run on. | True
30. The computer uses the binary number system to store data and perform calculations. |
True
31. Read-only memory is a type of memory that cannot be changed or erased by the user.
| True
32. The contents of RAM are lost when the computer turns off. | True
33. Accepting and processing data is a basic function of a computer. | True
34. Utility software is not a type of computer software. | False
35. A scanner is not an input device. | False
36. Application software is specialized software that allows the user to perform a specific
task. | True
37. The hard disk is the secondary memory of the computer. | True
38. A group of 4 bits known as Word. | False
39. The ALU is used for comparison and calculations. | True
40. Computers process data under the control of sets of instructions called programs. |
True
41. A computer is made up of a microprocessor unit, a memory unit, and an input/output
unit. | True
42. The processor is often referred to as the 'brain' of the motherboard. | True
43. A program is a set of instructions. | True
44. The ALU does the mathematical and logical operations. | True
45. The bit is the smallest unit of data. | True
46. RAM is used to store data temporarily. | True
47. ROM is used to begin the start-up process for your computer. | True
48. A keyboard is an input device. | True
49. The type of PROM that can be erased electrically is called EPROM. | False
50. UNIX is an operating system. | True
12
51. One megabyte is equivalent to 1024 B. | False
52. The operating system acts as an interface between user and the hardware. | True
53. The bits can have only 2 values. | True
13
14
15
Which is referred to as the brain of the computer?
(a) Processor
(b) RAM
(c) ROM
(d) Operating System
Which part of CPU perform calculations and make decision?
(a) Alternate Logic Unit
(b) Arithmetic Local Unit
(c) Arithmetic Logic Unit
(d) Alternate Local Unit
The memory capacity of a computer is represented in.
(a) Kilobits
(b) Kilobytes
(c) Memory chips
(d) None of above
Which of the following is non-volatile storage?
(a) Primary memory
(b) Secondary Storage
(c) Cache
(d) RAM
Keyboard is the _________ type of device?
(a) Printing
(b) Output
(c) Input
(d) Sound
Where are the data and programs stored when the processor uses them?
(a) Main Memory
(b) Secondary Memory
(c) Disk Memory
(d) Hard Disk
Software required to run the hardware is known as
(a) Task Manager
(b) Task Bar
(c) Program Manager
(d) Device Driver
1
Which software is used to operate the computer hardware and to provide a
platform for running application software
(a) System Software
(b) Software
(c) Operating System
(d) System Software
RAM stands
(a) Random Access Memory
(b) Ready Application Module
(c) Remote Access Machine
(d) Read Access Memory
Which of the following is a part of primary memory of computer
(a) PROM
(b) CD-ROM
(c) Pen-drive
(d) Floppy Disk
Operating system is installed on
(a) Hard Disk
(b) Cache memory
(c) Mother Board
(d) None of these
Which of the following is application software?
(a) Windows XP
(b) Power Point
(c) Android
(d) None of the above
What type of software manages and controls the hardware?
a) System software
b) Application software
c) Data software
d) Network software
Which of the following is an example of an output device?
a) Touchscreens
b) Projector
c) Scanner
d) Keyboard
2
The physical parts of a computer are referred to as:
a) Software
b) Hardware
c) Data
d) Networks
The set of instructions that tells a computer what to do is called:
a) Hardware
b) Software
c) Data
d) Network
The internet is an example of which key IT component?
a) Hardware
b) Software
c) Data
d) Network
Which component of a computer is responsible for performing calculations and
making decisions?
a) Input Unit
b) Central Processing Unit
c) Output Unit
d) Storage Unit
What type of memory is used to store data temporarily while a computer is
running?
a) HDD b) SSD
c) RAM d) ROM
Which device allows users to directly interact with a computer screen without using
a mouse?
a) Keyboard
b) Scanner
c) Touchscreen
d) Printer
A projector is primarily used for which purpose?
a) Data input
b) Data processing
c) Data output
d) Network communication
3
A device that can convert a printed document into a digital file is a:
a) Keyboard
b) Scanner
c) Printer
d) Speaker
Which of the following is NOT a primary type of computer memory?
a) RAM
b) ROM
c) Cache
d) Hard drive
Which type of memory is used to store data and instructions that are currently
being used by the CPU?
a) Primary memory
b) Secondary memory
c) Volatile memory
d) Non-volatile memory
Which of the following is not a type of software?
a) System software
b) Application software
c) Utility software
d) Programming language
Which of the following is an example of general-purpose application software?
a) Microsoft Word
b) Adobe Photoshop
c) AutoCAD
d) MATLAB
Which type of network covers a large geographic area, such as a city or country?
a) LAN
b) WAN
c) Internet
d) Bluetooth Network
What is the primary development purpose of the Internet?
a) To facilitate global trade
b) To share information and resources among universities and research institutions
c) To create online games
d) To provide entertainment platforms
4
Which type of Internet service is the oldest and slowest?
a) Broadband Internet
b) Dial-up Internet
c) Fiber Optic Internet
d) Mobile Internet
What is the main disadvantage of Dial-up Internet?
a) Fast speeds
b) Reliable connection
c) Suitable for streaming and gaming
d) Slow speeds and unreliable connection
Which type of Internet service uses fiber optic cables and provides the fastest
speeds?
a) Broadband Internet
b) Dial-up Internet
c) Mobile Internet
d) Fiber Optic Internet
What does URL stand for?
a) Uniform Resource Locator
b) Universal Resource Language
c) Unique Resource Link
d) Unified Resource Listing
Which protocol is used for the encrypted version of HTTP?
a) FTP
b) HTTPS
c) HTTP
d) SMTP
What is a valid condition for a URL?
a) Must contain spaces and special characters
b) Must start and end with alphanumeric characters or dashes
c) Must exceed a certain length of 2083 characters
d) Must consist of alphabets only
What is the standard format for email addresses?
a) domain.com@username
b) username@domain.com
c) email@internet
d) mail.domain@user
5
What do search engines do to help users navigate the Internet?
a) Create web pages
b) Crawl and index billions of web pages
c) Encrypt data transmission
d) Design websites
Which search engine holds around 90% of the global market share?
a) Bing
b) Yahoo
c) DuckDuckGo
d) Google
What is a tip for effective search mentioned in the text?
a) Use only one search engine for accurate results
b) Start with specific keywords and avoid refining your search
c) Ignore the credibility of the information source
d) Consider the intent of your search and use multiple search engines
What is the primary function of the internet?
(a) Selling products online
(b) Sharing information and resources
(c) Playing online games
(d) Sending emails
Which type of internet service is the fastest?
(a) Dial-up
(b) DSL
(c) Cable
(d) Fiber optic
What is the main purpose of an IP address?
(a) To identify a website on the internet
(b) To track user activity online
(c) To allow devices to communicate with each other
(d) To store personal data
What are the two main types of IP addresses?
(a) IPv2 and IPv3
(b) IPv4 and IPv6
(c) TCP/IP and UDP
(d) HTTP and HTTPS
6
Which protocol is used to securely transfer data over the internet?
(a) HTTP
(b) HTTPS
(c) FTP
(d) SMTP
What is the main function of a web browser?
(a) To send emails
(b) To create documents
(c) To access and interact with web pages
(d) To store files online
What are the two essential components of a valid URL?
(a) Username and password
(b) Domain name and protocol
(c) File size and extension
(d) Keywords and search terms
What is the difference between http and https?
(a) Http is faster, while https is more secure.
(b) Https is faster, while http is more secure.
(c) They both offer the same level of security.
(d) Http is used for web pages, while https is used for email.
Which of the following is NOT a common way for computer viruses to spread?
a) Clicking on suspicious links in emails
b) Downloading software from untrusted sources
c) Opening infected attachments in emails
d) Updating your operating system and antivirus software regularly
Which type of virus targets program files, causing unexpected application launches
and prolonged response times?
a) File infector virus
b) Trojan virus
c) Worm virus
d) Ransomware
What is the primary function of a Trojan virus?
a) Replicate itself and spread across systems
b) Create a backdoor for unauthorized access
c) Display unwanted advertisements on your computer
d) Encrypt files and demand ransom for decryption
7
How do worms typically spread without user intervention?
a) Through removable media like USB drives
b) By tricking users into clicking on malicious links
c) By exploiting vulnerabilities in computer systems and networks
d) Through phishing emails with deceptive messages
What is the MAIN consequence of a ransomware attack?
a) Slowing down your computer performance
b) Stealing your personal and financial information
c) Making your computer display unwanted ads
d) Rendering your files inaccessible and demanding ransom for decryption
What is NOT a characteristic of spyware?
a) Operating silently in the background
b) Monitoring user activities and gathering sensitive information
c) Sending collected data to a remote server
d) Displaying intrusive pop-up advertisements
What is the primary reason why adware can be harmful?
a) It directly damages your computer hardware
b) It exposes your sensitive data to cybercriminals
c) It interferes with your online browsing experience and consumes resources
d) It patches security vulnerabilities and reduces virus infection risk
How can Boot Sector Viruses disrupt the normal operation of your computer?
a) By encrypting essential system files and demanding ransom
b) By displaying unwanted advertisements on your screen
c) By corrupting the critical startup part of your hard drive
d) By stealing your login credentials and passwords
Which of the following BEST describes the importance of using strong passwords?
a) It makes your computer immune to all types of malware
b) It enhances your browsing speed and online experience
c) It protects your accounts from unauthorized access and data breaches
d) It saves storage space on your hard drive
Which of the following strategies is LEAST effective in protecting yourself from
computer viruses and malware?
a) Avoiding suspicious links and attachments in emails
b) Downloading software only from trusted sources
c) Disabling your antivirus software and firewalls entirely
d) Regularly backing up your important data
8
What is the format of IP V4 address?
A. 34 bit
B. 64 bit
C. 16 bit
D. 32 bit
The last address of IP address represents
A. Unicast address
B. Network address
C. Broadcast address
D. None of above
How many bits are in Version 6 of IP address?
A. 64 bits B. 128 bits
C. 32 bits D. 256 bits
How many version /s of IP’s are there?
a) 4 versions
b) 3 versions
c) 2 versions
d) 1 version
Which type of topology is best suited for large businesses which must carefully control
and coordinate the operation of distributed branch outlets?
a. Ring
b. Local area
c. Hierarchical
d. Star
What kind of transmission medium is most appropriate to carry data in a
computer network that is exposed to electrical interferences?
a) Unshielded twisted pair
b) Optical fiber
c) Coaxial cable
d) Microwave
The location of a resource on the internet is given by its.
a) Protocol
b) URL
c) E-mail address
d) ICQ
9
The term HTTP stands for
a) Hyper terminal tracing program
b) Hypertext tracing protocol
c) Hypertext transfer protocol
d) Hypertext transfer program
Which software prevents external access to a system?
a. Firewall
b. Gateway
c. Router
d. Virus checker
Which one of the following is a valid email address?
a) javat@point.com
b) gmail.com
c) tpoint@.com
d) javatpoint@books
Which one of the following is the most common internet protocol?
a) HTML
b) NetBEUI
c) TCP/IP
d) IPX/SPX
The term FTP stands for
a) File transfer program
b) File transmission protocol
c) File transfer protocol
d) File transfer protection
Which one of the following is not a network topology?
a) Star
b) Ring
c) Bus
d) Peer to Peer
Which of the following is correct IPv4 address?
a) 01.200.128.123
b) 300.142.210.64
c) 10110011.32.16.8
d) 128.64.0.0
10
The term WAN stands for
a) Wide Area Net
b) Wide Access Network
c) Wide Area Network
d) Wide Access Net
The term IPv4 stands for?
a) Internet Protocol Version 4
b) Internet Programming Version 4
c) International Programming Version 4
d) None of these
The term LAN stands for
a) Local Area Net
b) Local Aera Network
c) Local Array Network
d) Local Array Net
Identify the protocol primarily used for browsing data.
a) FTP
b) TCP
c) TFTP
d) HTTP
What is a computer network?
a) A device used to display information on a computer screen
b) A collection of interconnected computers and devices that can communicate and share
resources
c) A type of software used to create documents and presentations
d) The physical casing that protects a computer’s internal components
What is internet?
a) A network of interconnected local area networks
b) A collection of unrelated computers
c) Interconnection of wide area networks
11
d) A single network
Which topology requires a multipoint connection?
a) Ring
b) Bus
c) Star
d) Mesh
What is the term for the data communication system within a building or campus?
a) MAN
b) LAN
c) PAN
d) WAN
Which network topology requires a central controller or hub?
a) Ring
b) Bus
c) Star
d) Mesh
Which connection is necessary for a computer to join the internet?
a) internet society
b) internet service provider
c) different computer
d) internet architecture board
Which of the following allows you to connect and login to a remote computer?
a) SMTP
b) HTTP
c) FTP
d) Telnet
12
Computer virus is simply meaning is _______________
A. hardware component
B. disease
C. set of computer instructions or code
D. Type of bacteria
13
14
True/False
1) The monitor, keyboard, and mouse are all examples of software. (False)
2) Hard drives can store data permanently, even without power. (True)
3) Touchscreens are considered both input and output devices. (True)
4) The Control Unit (CU) fetches instructions from the CPU's memory. (False)
5) The CPU fetches instructions from the computer's permanent memory (ROM).
(False)
6) A higher clock speed always indicates a faster CPU. (True)
7) The motherboard is responsible for providing power to all other components in
the computer. (False)
8) CPU sockets determine the type of RAM a motherboard can support. (False)
9) All motherboards offer the same variety and number of connectors and ports.
(False)
10) A quad-core CPU can process four instructions simultaneously. (True)
11) Cache is a type of memory built into the motherboard. (False)
12) Intel CPUs are known for their multi-core performance and low cost.
(False)
13) The motherboard serves as a platform that connects and integrates various
hardware components. (True)
14) The motherboard serves as a platform that connects and integrates various
hardware components. (True)
15) A Computer Network is a set of isolated computers that do not
communicate with each other. (False)
16) One of the benefits of networking is cost efficiency due to the sharing of
resources. (True)
17) A Wide Area Network (WAN) is limited to a small geographic area, such as
an office or a building. (False)
18) A Router connects devices within a network and manages data traffic.
(True)
19) Wi-Fi is an example of wireless transmission media used for long-distance
communication. (False)
20) The TCP/IP protocol is fundamental for internet communication. (True)
21) HTTP is responsible for enabling file sharing. (False)
22) In a Star Topology, if the main hub stops working, the whole network is at
risk. (True)
15
23) Bus Topology is complex to design and manage. (False)
24) Firewalls are used in networking to control and monitor incoming and
outgoing network traffic. (True)
25) Authentication in networking ensures that only authorized devices are part
of the network. (True)
26) Resource sharing in a network is limited to file sharing. (False)
27) Communication through email and messaging is possible without
networking. (False)
28) LANs cover a wider geographic area than WANs. (False)
29) The internet is an example of a LAN. (False)
30) WANs rely on high-speed data cables or satellites for communication.
(True)
31) Special software is needed to connect to a LAN, but not a WAN. (False)
32) All devices connected to a WAN have direct access to each other. (False)
33) A router connects devices within a network. (False)
34) A hub sends data to only one specific device at a time. (False)
35) Switches are more intelligent than hubs in managing data traffic. (True)
36) Wireless transmission media offer less reliable data transfer than wired
media. (True)
37) Wi-Fi and Bluetooth are both suitable for long-distance communication.
(False)
38) FTP allows users to browse websites. (False)
39) DNS translates IP addresses into domain names. (False)
40) A star topology is more reliable than a bus topology. (True)
41) Adding a new device to a bus topology disrupts the entire network. (True)
42) Mesh topologies are the most common type of network due to their
simplicity. (False)
43) In a mesh topology, malfunctioning equipment can bring down the entire
network. (False)
44) Hybrid topologies combine features of different types of topologies. (True)
45) Firewalls only control outgoing network traffic. (False)
46) Encryption is only necessary for confidential data transmission. (False)
47) Authentication verifies the identity of devices and users accessing the
network. (True)
48) A computer virus is a hardware infection that damages physical
components. (False)
16
49) Viruses can replicate themselves and spread within a computer system.
(True)
50) The only harmful effect of a virus is slowing down the computer. (False)
51) Data loss or corruption is a potential consequence of a virus infection.
(True)
52) Email attachments are a common way for viruses to spread. (True)
53) Viruses can be hidden within images or videos shared online. (True)
54) Clicking on suspicious links on websites can infect your computer with a
virus. (True)
55) Antivirus software can completely prevent any virus infection. (False)
56) Regularly updating your operating system and software can help protect
against viruses. (True)
57) Computer viruses can only spread through email attachments. (False)
58) Downloading software from legitimate sources guarantees complete
protection from viruses. (False)
59) Clicking on suspicious links on websites is a common way for viruses to
spread. (True)
60) Visiting infected websites cannot infect your computer with a virus if you
have antivirus software installed. (False)
61) Social engineering tactics are not used by hackers to spread viruses. (False)
62) File infector viruses primarily target .exe files. (True)
63) Trojan viruses are responsible for encrypting files and demanding ransom.
(False)
64) Worms can spread across systems without user interaction by exploiting
vulnerabilities. (True)
65) Spyware focuses on displaying unwanted advertisements on your computer.
(False)
66) The worst consequence of a virus infection is usually a slow computer.
(False)
67) Data loss or corruption is a possible outcome of a computer virus attack.
(True)
68) Ransomware victims can always recover their data by paying the ransom
demanded. (False)
69) Spyware can steal sensitive information like passwords and bank details.
(True)
17
70) Adware does not pose any significant threat to a computer's security.
(False)
71) Boot sector viruses cannot infect modern operating systems. (False)
72) Computer viruses are the only type of malware that can harm your
computer. (False)
18