Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CUT6 9.2

Computers: Understanding Tech 6e 9.2

QuestionAnswer
virus Maliciously designed code that infects executable files and spreads the code to other executable files, as well as performing harmful or annoying actions on the computer.
worm A form of malware that actively attempts to move and copy itself across a network.
nuisance virus A type of virus that does no real damage but is rather just an inconvenience. In most cases, the purpose of a nuisance virus is to try to bully a computer user into purchasing a product.
espionage virus A type of virus that doesn’t inflict immediate damage but allows a hacker or cracker to enter the system later for the purpose of stealing data or spying on the work of a competitor.
keystroke logger A type of espionage virus that stores every typed keystroke. A hacker can analyze the keystroke file, looking for credit card numbers and passwords to allow access to accounts. Also called keylogger.
data-destructive virus A type of virus designed to destroy installed programs or their data files.
polymorphic virus A virus programmed to change itself and its behavior to fool the programs meant to stop it.
stealth virus A type of virus that tries to hide from the software designed to find and destroy it.
macro virus A type of virus written specifically for one program, such as Microsoft Word. The program becomes infected when it opens a file with the virus stored in its macros.
boot sector The part of a hard disk that contains information about the disk itself, including how the disk is organized and whether it’s capable of loading an operating system.
boot sector virus A type of virus designed to alter the boot sector of a disk, so that whenever the operating system reads the boot sector, the computer will automatically become infected.
Trojan horse virus A type of virus that hides inside something else—in this case, another legitimate program. This type of virus is quite common with downloaded games and other types of shareware files, such as screen savers.
multipartite virus A type of virus named for its ability to attack a computer in several different ways.
logic bomb virus A type of virus that typically doesn’t act immediately but rather sits quietly dormant, waiting for a specific event or set of conditions to occur. Also called time bomb virus.
Created by: softcrylic