Study

Grade 7 Graded Recitation Set B

  •   0%
  •  0     0     0

  • often are disguised as useful software.
    Trojans
  • A ______ is a self-replicating program that is harmful to networks
    Worm
  • are created with malicious intent and sent by attackers
    Computer Virus
  • is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again
    Ransomware
  • This security attack refers to events or attacks that remove, corrupt, deny access to, allow access to, or steal information.
    Data
  • It specifies the task that can be performed on a file such as opening and closing of file.
    File operations
  • It specifies the characteristics of the files such as type, date of last modification, size, location on disk etc.
    File attributes
  • is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
    Spyware
  • built in antivirus software of windows
    Windows security
  • Remains the most popular operating system
    Microsoft windows
  • Is Software Designed To Detect, Disable, And Remove Viruses, Worms, And Trojans Before They Infect A Computer.
    Antivirus software
  • The most important software that runs on a computer
    Operating System
  • It is a security attack refers to events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.
    Physical
  • It is a system of interactive visual components for computer software
    GUI
  • It specifies the access permissions related to a file such as read and write.
    File access permission
  • It aids the user and the hardware to function and interact with each other
    System Software