How can we help?
You can also find more resources in our
Select a category
Something is confusing
Something is broken
I have a suggestion
What is your email?
What is 1 + 3?
Unit 6 Viruses & Destructive Programs Test Review
A computer program written to alter the way a computer operates.
Viruses can . . .
corrupt files; destroy data, display messsages, corrupt systems
Types of viruses
Trojan Horse, worm, bootsector, macro memory, rootkit, logic bomb, time bomb
How viruses are spread
Email, websites, networks, phishing, hackers, messaging, mobile devices, friends and family
Protect your computer
Anti-virus software, avoid rogue websites, don't open suspicious attachments, etc.
Use at least seven characters and include symbols, upper and lower case letters
Finding weaknesses in a computer system with the intention of doing damage.
Firewalls, filters and parental controls
Copyrighted software which is made available without charge.
Software that can be used free of charge for a period of time then a charge is applied.
Malware that masquerades as legitimate while doing damage to a computer system.
Malware program that replicates itself in order to do damage computer to computer.
Destructive program designed to discover personal/computer passwords.
Type of virus that inserts a destructive code into executable files.
Short of malicious software. Example: Trojan Horse.
Software designed to embed advertisements into applications being used.
Software that gathers user information through the user's Internet connection without his knowledge.
Phishing & Spoofing
Actions taken through email to falsely gather personal information about the user. Used for identify theft purposes.
The act of obtaining or attempting to obtain secure data by conning individuals into revealing personal information.
Act of driving around in a vehicle with a laptop or other mobile device in order to use unauthorized wireless services for hacking or other unethical purposes.