Author Archives: Rana Tahir

In 1999, the Melissa virus was a widely publicised ?

A. E-mail virus.
B. Macro virus.
C. Trojan horse.
D. Time bomb.

An intentionally disruptive program that spreads from program to Program or from disk to disk is known as a ?

A.Trojan horse.
B.Virus.
C.Time bomb.
D.Time-related bomb sequence.

A Program that performs a useful task while Simultaneously allowing destructive acts is a ?

A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus

Collecting personal information and effectively posing as another individual is known as the crime of ?

A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.

The common name for the crime of stealing passwords is ?

A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.

The typical computer criminal is a(n) ?

A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.

Large transaction processing systems in automated Organization’s use ?

A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing