{"id":165,"date":"2020-11-27T14:43:08","date_gmt":"2020-11-27T19:43:08","guid":{"rendered":"https:\/\/opentextbc.ca\/computerstudies\/chapter\/unit-5-self-test\/"},"modified":"2022-07-25T15:23:44","modified_gmt":"2022-07-25T19:23:44","slug":"unit-5-self-test","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/computerstudies\/chapter\/unit-5-self-test\/","title":{"raw":"Unit 5: Self-test","rendered":"Unit 5: Self-test"},"content":{"raw":"<p style=\"text-align: center;\">Click play on the following audio player to listen along as you read this section.<\/p>\r\nhttps:\/\/media.bccampus.ca\/id\/0_wxtkk1dy?width=608&amp;height=70&amp;playerId=23449753\r\n\r\nFind answers to this self-test at the back of the book: <a class=\"internal\" href=\"\/computerstudies\/back-matter\/answers-for-self-tests\/\">Answers for Self-Tests<\/a>\r\n<h2>True or false<\/h2>\r\n<ol>\r\n \t<li>A\u00a0malware cannot gain unauthorized access to a computer and\u00a0continuously run in\u00a0the background without owner\u2019s knowledge.<\/li>\r\n \t<li>A\u00a0virus can make a copy of itself over and over again.<\/li>\r\n \t<li>A Trojan\u00a0may claim to get rid your computer of viruses but instead introduces viruses onto your computer.<\/li>\r\n \t<li>The key\u00a0difference between\u00a0a virus\u00a0and\u00a0a worm is\u00a0that a worm needs human action to replicate, whereas, a virus doesn\u2019t.<\/li>\r\n \t<li>Enter a person\u2019s email address to the 'Cc'\u00a0field means that person will receive a copy of the email.<\/li>\r\n<\/ol>\r\n<h2>Fill in the blank<\/h2>\r\n<ol start=\"6\">\r\n \t<li>A [blank] refers to a person who can gain unauthorized access to a computer or a network to commit crimes.<\/li>\r\n \t<li>A [blank] can spread from one computer to another through email attachments, removable storage devices, networks, etc.<\/li>\r\n \t<li>A [blank] is similar to a virus. It is designed to quickly self-replicate and spread copies of themselves from one computer to another.<\/li>\r\n \t<li>A [blank] can record a user's Web browsing habits, email messages, keystrokes on online advertisements, personal information, etc., and forward it to a third party.<\/li>\r\n \t<li>Bcc is similar to that of Cc except that the email addresses are [blank] to the people in the \u201cTo\u201d or \u201cCc\u201d fields.<\/li>\r\n \t<li>The [blank] folder is the place where incoming emails are received and stored.<\/li>\r\n \t<li>Every email that you delete will be moved to the \u201c[blank] Items\u201d folder.<\/li>\r\n<\/ol>\r\n<h2>Multiple choice<\/h2>\r\n<ol start=\"13\">\r\n \t<li>[Blank] is a software that is designed to infiltrate, damage, disrupt, or infect computers.\r\n<ol type=\"a\">\r\n \t<li>Malware<\/li>\r\n \t<li>Firefox<\/li>\r\n \t<li>Yandex<\/li>\r\n \t<li>RAM<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>Malware is a single term that refers to all the different types of threats to your computer safety such as:\r\n<ol type=\"a\">\r\n \t<li>Trojan horse<\/li>\r\n \t<li>worm<\/li>\r\n \t<li>virus<\/li>\r\n \t<li>all of the above<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>[Blank] is a software that secretly monitors (spies) user\u2019s online behaviour and gets sensitive information about a person or organization without the user\u2019s knowledge.\r\n<ol type=\"a\">\r\n \t<li>Trojan horse<\/li>\r\n \t<li>spyware<\/li>\r\n \t<li>virus<\/li>\r\n \t<li>worm<\/li>\r\n<\/ol>\r\n<\/li>\r\n \t<li>An unfinished email will be automatically saved to your [blank] folder.\r\n<ol type=\"a\">\r\n \t<li>Sent<\/li>\r\n \t<li>Junk<\/li>\r\n \t<li>Drafts<\/li>\r\n \t<li>Deleted items<\/li>\r\n<\/ol>\r\n<\/li>\r\n<\/ol>\r\n<img class=\"aligncenter wp-image-1371\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/clipboard.png\" alt=\"\" width=\"115\" height=\"161\" \/>","rendered":"<p style=\"text-align: center;\">Click play on the following audio player to listen along as you read this section.<\/p>\n<p><iframe loading=\"lazy\" id=\"kaltura_player\" title=\"Sect.1 Unit 5 Self-test\" src=\"https:\/\/api.ca.kaltura.com\/p\/148\/sp\/14800\/embedIframeJs\/uiconf_id\/23449753\/partner_id\/148?iframeembed=true&#38;playerId=kaltura_player&#38;entry_id=0_wxtkk1dy&#38;flashvars[leadWithHTML5]=true&#38;flashvars[streamerType]=auto&#38;flashvars[localizationCode]=en&#38;flashvars[sideBarContainer.plugin]=true&#38;flashvars[sideBarContainer.position]=left&#38;flashvars[sideBarContainer.clickToClose]=true&#38;flashvars[chapters.plugin]=true&#38;flashvars[chapters.layout]=vertical&#38;flashvars[chapters.thumbnailRotator]=false&#38;flashvars[streamSelector.plugin]=true&#38;flashvars[EmbedPlayer.SpinnerTarget]=videoHolder&#38;flashvars[dualScreen.plugin]=true&#38;flashvars[Kaltura.addCrossoriginToIframe]=true&#38;wid=0_01z1pq34\" width=\"608\" height=\"70\" allowfullscreen=\"allowfullscreen\" sandbox=\"allow-downloads allow-forms allow-same-origin allow-scripts allow-top-navigation allow-pointer-lock allow-popups allow-modals allow-orientation-lock allow-popups-to-escape-sandbox allow-presentation allow-top-navigation-by-user-activation\" frameborder=\"0\"><\/iframe><\/p>\n<p>Find answers to this self-test at the back of the book: <a class=\"internal\" href=\"\/computerstudies\/back-matter\/answers-for-self-tests\/\">Answers for Self-Tests<\/a><\/p>\n<h2>True or false<\/h2>\n<ol>\n<li>A\u00a0malware cannot gain unauthorized access to a computer and\u00a0continuously run in\u00a0the background without owner\u2019s knowledge.<\/li>\n<li>A\u00a0virus can make a copy of itself over and over again.<\/li>\n<li>A Trojan\u00a0may claim to get rid your computer of viruses but instead introduces viruses onto your computer.<\/li>\n<li>The key\u00a0difference between\u00a0a virus\u00a0and\u00a0a worm is\u00a0that a worm needs human action to replicate, whereas, a virus doesn\u2019t.<\/li>\n<li>Enter a person\u2019s email address to the &#8216;Cc&#8217;\u00a0field means that person will receive a copy of the email.<\/li>\n<\/ol>\n<h2>Fill in the blank<\/h2>\n<ol start=\"6\">\n<li>A [blank] refers to a person who can gain unauthorized access to a computer or a network to commit crimes.<\/li>\n<li>A [blank] can spread from one computer to another through email attachments, removable storage devices, networks, etc.<\/li>\n<li>A [blank] is similar to a virus. It is designed to quickly self-replicate and spread copies of themselves from one computer to another.<\/li>\n<li>A [blank] can record a user&#8217;s Web browsing habits, email messages, keystrokes on online advertisements, personal information, etc., and forward it to a third party.<\/li>\n<li>Bcc is similar to that of Cc except that the email addresses are [blank] to the people in the \u201cTo\u201d or \u201cCc\u201d fields.<\/li>\n<li>The [blank] folder is the place where incoming emails are received and stored.<\/li>\n<li>Every email that you delete will be moved to the \u201c[blank] Items\u201d folder.<\/li>\n<\/ol>\n<h2>Multiple choice<\/h2>\n<ol start=\"13\">\n<li>[Blank] is a software that is designed to infiltrate, damage, disrupt, or infect computers.\n<ol type=\"a\">\n<li>Malware<\/li>\n<li>Firefox<\/li>\n<li>Yandex<\/li>\n<li>RAM<\/li>\n<\/ol>\n<\/li>\n<li>Malware is a single term that refers to all the different types of threats to your computer safety such as:\n<ol type=\"a\">\n<li>Trojan horse<\/li>\n<li>worm<\/li>\n<li>virus<\/li>\n<li>all of the above<\/li>\n<\/ol>\n<\/li>\n<li>[Blank] is a software that secretly monitors (spies) user\u2019s online behaviour and gets sensitive information about a person or organization without the user\u2019s knowledge.\n<ol type=\"a\">\n<li>Trojan horse<\/li>\n<li>spyware<\/li>\n<li>virus<\/li>\n<li>worm<\/li>\n<\/ol>\n<\/li>\n<li>An unfinished email will be automatically saved to your [blank] folder.\n<ol type=\"a\">\n<li>Sent<\/li>\n<li>Junk<\/li>\n<li>Drafts<\/li>\n<li>Deleted items<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1371\" src=\"https:\/\/opentextbc.ca\/computerstudies\/wp-content\/uploads\/sites\/322\/2020\/11\/clipboard.png\" alt=\"\" width=\"115\" height=\"161\" \/><\/p>\n","protected":false},"author":90,"menu_order":3,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-165","chapter","type-chapter","status-publish","hentry"],"part":150,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/users\/90"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/165\/revisions"}],"predecessor-version":[{"id":630,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/165\/revisions\/630"}],"part":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/parts\/150"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapters\/165\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/media?parent=165"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/pressbooks\/v2\/chapter-type?post=165"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/contributor?post=165"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/computerstudies\/wp-json\/wp\/v2\/license?post=165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}