161. USB is a type of-
A. Processor
B. Port
C. Monitor
D. Program
162. Surgeons can perform delicate operation by manipulating devices through computers instead of manually. This technology is known as-
A. Robotics
B. Computer forensics
C. Simulation
D. Forecasting
163. Process of combining strings is known as
A. Compiling
B. Combining
C. Attaching
D. Concatenation
164. A program that performs a useful task while simultaneously allowing destructive acts is:
A. Worm
B. Trojan Horse
C. Virus
D. Macro Virus
165. In 1999, the Melissa virus was a widely publicized:
A. E-mail Virus
B. Macro virus
C. Trojan Horse
D. Time Bomb
166. An intentionally disruptive program that spreads from program to program or from disk to disk is known as
A. Trojan horse
B. Virus
C. Time bomb
D. Time related bomb sequence
167. Malicious software is known as:
A. Badware
B. Malware
C. Maliciousware
D. Illegalware
168. Collecting personal information and effectively posing as another individual is known as the crime of:
A. Spooling
B. Identity Theft
C. Spoofing
D. Hacking
169. The common name for the crime of stealing passwords is:
A. Spooling
B. Identity theft
C. Spoofing
D. Hacking
170. The majority of computer crimes are committed by:
A. Hackers
B. Insiders
C. Overseas criminals
D. Young teenage computer geniuses
