A type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".
What is a Virus?
100
Dihydrogen monoxide is also known as.
What is Water?
100
This is the difference between the largest number and smallest number in a data set.
What is the range?
100
F=m*a
What is Newton's second law of motion?
200
A data storage device used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.
What is a hard drive?
200
an error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.
What is a software bug?
200
This element, in its purified form is a key component in semiconductor devices.
What is Silicon?
200
the mathematical study of change.
What is Calculus?
200
a^2 + b^2 = c^2
What is the Pythagorean Theorem?
300
The hardware within a computer that carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system.
What is a Central Processing Unit (CPU)?
300
is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions, typically causing loss or theft of data, and possible system harm.
What is a Trojan?
300
Makes up Protons, Neutrons, and Electrons.
What is a Quark?
300
This is the median of the following stem-and-leaf plot: 1| 227
2| 33344566889
3| 0146
4| 06
What is 26?
300
The measure of the amount of electric charge passing a point in an electric circuit per unit time
What is an ampere?
400
A form of computer data storage. This device allows data items to be read and written in roughly the same amount of time regardless of the order in which data items are accessed.
What is rapid access memory (RAM)?
400
Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection. Theses software packages allow this concealment, by modifying the host's operating system so that the malware is hidden from the user.
What is a Rootkit?
400
The chemistry of the compound is R3COH.
What is Alcohol?
400
In statistics, List three items in a five number summary.
What are the minimum, lower quartile, median, upper quartile, and the maximum?
400
The equation measuring the elasticity of a string.
What is young's modulus (y=Stress/Strain)?
500
a two-lead semiconductor light source
What is a Light Emitting Diode?
500
A method of bypassing normal authentication procedures. Once a system has been compromised, one or more may be installed in order to allow easier access in the future.
What is a Backdoor?
500
The chemistry formula of sugar.
What is C12H22O11?
500
An equation containing a function of one independent variable and its derivatives.