Computer (Part-3)

Total Questions: 50

11. What is meant by bug in computer terminology? [S.S.C. Online Graduation Level (T-I) 9.08.2017 (Shift-II)]

Correct Answer: (c) A mistake in the program
Solution:
A bug is essentially a mistake in the code or design of a program or system, causing it to deviate from its intended behavior.

How it manifests:
Bugs can cause a wide range of problems, from minor glitches like incorrect output or frozen screens to major issues like system crashes or data corruption.
Causes:
Bugs often arise from human errors during the programming process, such as mistakes in code or design flaws.
Example:
A simple bug could be a typo in the code that causes a program to miscalculate a result. A more complex bug could be a design flaw that leads to the entire system crashing. 

12. What is a 'bug'in computer terminology? [S.S.C. Online MTS (T-I) 4.10.2017 (Shift-II)]

Correct Answer: (b) Error in computer program
Solution:
A bug is essentially a mistake in the code or design of a program or system, causing it to deviate from its intended behavior.

How it manifests:
Bugs can cause a wide range of problems, from minor glitches like incorrect output or frozen screens to major issues like system crashes or data corruption.
Causes:
Bugs often arise from human errors during the programming process, such as mistakes in code or design flaws.
Example:
A simple bug could be a typo in the code that causes a program to miscalculate a result. A more complex bug could be a design flaw that leads to the entire system crashing. 

13. What is Michelangelo in the world of computers? [S.S.C. Online Stenographer 13.09.2017 (Shift-II)]

Correct Answer: (b) A virus
Solution:

In the world of computers, Michelangelo refers to a computer virus that gained significant notoriety in the early 1990s. Here's what's important to know about it:
Type of Virus:
Michelangelo was a
boot sector virus. This means it infected the part of a storage device (like a hard drive or floppy disk) that the computer reads when it starts up.
Activation Date:
The virus was programmed to lie dormant until March 6th of each year, which coincidentally is the birthday of the Renaissance artist Michelangelo. On this date, it would attempt to overwrite critical data on the hard drive, often rendering the system unable to boot and making data recovery very difficult for the average user.
Discovery and Spread:
It was first discovered in Australia in February 1991. Like many viruses of its time, it spread primarily through infected floppy disks. If a user booted their computer from an infected floppy, the virus would install itself on the hard drive and could then infect other floppy disks accessed by that machine.
The 1992 Scare:
Michelangelo gained widespread international attention in early 1992. There were exaggerated predictions, fueled in part by antivirus software companies, that millions of computers could be affected on March 6th. This led to significant media coverage and public concern, arguably marking one of the first major global panics surrounding a computer virus.
Actual Impact:
While the anticipation was high, the actual damage on March 6, 1992, was much less severe than predicted.
Estimates vary, but reports suggest that somewhere between 10,000 to 20,000 computers experienced data loss.
Legacy:
Despite the overblown predictions, the Michelangelo virus is a significant event in computer security history. It raised public awareness about the threat of malware and contributed to the growth of the antivirus industry. It also highlighted how easily misinformation and fear could spread, even in the early days of widespread personal computer use.
Dormant Nature:
A key characteristic of Michelangelo was its long dormant period. An infected computer might not show any symptoms until the fateful March 6th, allowing the virus to spread unknowingly through shared floppy disks.
Not a Threat Today:
Because it was designed for DOS systems and relied on floppy disks for propagation, the Michelangelo virus is not a significant threat to modern computers. However, it remains a historical example of early malware and its potential to cause widespread concern.

So, in the world of computers, Michelangelo is remembered as a boot sector virus that caused a notable, if somewhat overhyped, global scare in the early 1990s due to its destructive payload activating annually on March 6th.   

14. Which type of malware is a program or piece of code loaded onto a person's computer without his knowledge and runs against his wishes? [S.S.C. Online CHSL (T-I) 13.04.2021 (Shift-III)]

Correct Answer: (d) computer virus
Solution:A computer virus is the type of malware that is loaded onto a computer without the user's knowledge and runs against their wishes. It is a program or piece of code that replicates itself and inserts its own code into other programs or files.

15. Which one of the following is a computer virus? [S.S.C. Online CHSL (T-I) 09.08.2021 (Shift-I)]

Correct Answer: (b) Creeper
Solution:Creeper is a computer virus that is most commonly recognized as the first computer virus.
  • Self-Replication:
    Creeper, created in 1971, could move between ARPANET (the precursor to the internet) nodes and display the message "I'M THE CREEPER : CATCH ME IF YOU CAN." This demonstrates self-replication, a key characteristic of viruses.
  • Lack of Malicious Intent:
    However, Creeper wasn't designed to cause harm or steal information. Its purpose was primarily experimental, to see if a program could move autonomously across a network.
  • Reaper:
    In response to Creeper, another program called Reaper was developed to find and delete Creeper. This makes the Creeper/Reaper interaction an early example of a "virus" being countered by an "antivirus."
  • Evolution to Viruses:
    While not a virus in the modern sense (which typically implies malicious intent), Creeper's ability to self-replicate and move between systems laid some of the groundwork for the development of actual computer viruses later on.

So, while it shares the self-replicating aspect with viruses, Creeper's lack of malicious intent and its experimental nature mean it's generally considered an early self-replicating program rather than a true computer virus as we understand them today. It's a fascinating ancestor in the history of malware!

16. _________is the illegal reproduction and distribution of software applications. [S.S.C. JE Electrical Exam 10.12.2020 (Shift-II)]

Correct Answer: (b) Software piracy
Solution:Software piracy can be defined as the use of software that is not properly licensed. That might include copying, modifying, distributing or selling the software in ways that contravene copyright laws or license terms. Piracy essentially compromises software suppliers’ ability to monetize their software and be compensated for their research and development.

17. A person who breaks to obtain information stored in computer system for unauthorized use, what is he called? [S.S.C. JE Mechanical Exam 27.10.2020 (Shift-II)]

Correct Answer: (a) Hacker
Solution:A person who breaks into a computer system to obtain information stored there for unauthorized use is commonly called a hacker .
Hacker:
This term originally referred to someone with a deep understanding of computer systems and networks, often using their skills in creative and unconventional ways. However, it has become increasingly associated with individuals who gain unauthorized access to computer systems.
Cracker:
This term is often used to specifically describe individuals who break into computer systems with malicious intent, such as to steal data, damage systems, or disrupt operations. The term emphasizes the "cracking" of security measures.

While "hacker" is the more widely recognized term in popular culture, in a security context, "cracker" often more accurately describes someone who illegally breaches systems for unauthorized purposes. Other related terms you might hear include cybercriminal or malicious actor.

18. Malicious software is any program or file that is harmful to a computer user. Which of the following is malicious software? [S.S.C. JE Mechanical Exam 22.03.2021 (Shift-I)]

Correct Answer: (c) Malware
Solution:Any software intentionally designed to harm or disrupt computer systems, networks, or data.
Purpose:
 It's used for various malicious purposes, including stealing data, disrupting systems, gaining unauthorized access, and extorting individuals or organizations. 

19. Regarding computers and the internet, which of the following appears harmless but produces harmful results? [S.S.C. JE Mechanical Exam 22.03.2021 (Shift-I)]

Correct Answer: (d) Trojan horse
Solution:Appears Harmless:
A Trojan often disguises itself as legitimate software, like a useful utility, a game, or even an email attachment from a seemingly trustworthy source. The user might willingly download or open it,
believing it to be safe.
Produces Harmful Results:
Once executed, the Trojan can carry out a variety of malicious activities in the background without the user's knowledge or consent. This can include:
  • Stealing sensitive information: Passwords, credit card details, personal data.
  • Creating backdoors: Allowing attackers remote access to the infected system.
  • Deleting or modifying files.
  • Installing other malware: Viruses, worms, spyware, ransomware.
  • Disrupting system performance.
  • Being part of a botnet: Used to launch attacks on other systems.

The name "Trojan Horse" comes from the ancient Greek story where a large wooden horse appeared to be a gift but secretly contained enemy soldiers who then infiltrated the city of Troy. Similarly, a computer Trojan tricks users into allowing malicious software onto their systems.

20. Which of the following is not a weighted code? [S.S.C. Online Graduation Level (T-I) 31.12.2016 (Shift-II)]

Correct Answer: (a) Excess 3-Code
Solution:

In Excess-3 code, there are no fixed weights assigned to the bit positions. Instead, it's derived from the Binary Coded Decimal (BCD) representation by adding 3 (binary 0011) to each decimal digit.
For example, the decimal digit 0 is represented as 0000 in BCD. In Excess-3 code, it becomes 0000 + 0011 = 0011. The binary digits in 0011 don't have inherent weights that directly correspond to the decimal value 0.

Therefore, because the value of an Excess-3 code is determined by its relationship to the BCD code (with an added bias of 3) rather than fixed positional weights, it is classified as a non-weighted code.