Louis Gouge

ITS 230

Chapter 4


1. F      2. T      3. F      4. T      5. T      6. F      7. T      8. T      9. T      10. T    11. F    12. F


Multiple Choice

1. D     2. A     3. A     4. C     5. B     6. A     7. C     8. B



1. D     2. B     3. E      4. I       5. G     6. F      7. A     8. C     9. J      10. H


Consider This

2. The role of the operating system “serves as the interface between the user, the applications and other programs, and the computer’s or mobile device’s hardware.”  In order to be able to use applications such as a browser, or word processing program on a desktop, laptop or mobile device your computer needs to be running an operating system. (pg. 158)

3. System software is a “term used to refer to the operating system and other tools that consist of the programs that control or maintain the operations of the computer and its devices”. (pg. IND 44)

10. Font style adds emphasis to a font. A font is a name assigned to a specific design of characters. A font style can be bold, italic, underline and color. (pg. 166)


Internet Research

4. Security:

According to snopes.com the three real viruses at the top of their list are:

            Heartbleed—“The bug, dubbed "heartbleed," resides in a software library called OpenSSL that is used in servers, operating systems, email, and instant messaging systems. Ironically, this software is supposed to protect sensitive data as it travels back and forth.” (snopes.com)

            Funeral Announcement—“users began receiving e-mails from various funeral homes with attention-getting subject lines such as "Passing of your friend," messages that informed recipients a "dear friend" had passed away and invited them to attend that person's upcoming funeral or memorial service. The messages provided a hyperlink (on the word "here") for readers to click in order to obtain detailed information about the date and location of the service. However, that link actually pointed to a foreign web site and initiated the download of a ZIP file (e.g., FuneralProcession.zip); users who attempted to open and view that ZIP file ended up executing a malicious file (e.g., FuneralProcession.exe) which installed a Trojan on their PCs.” (snopes.com)

            CryptoLocker“The CryptoLocker worm is generally spread via drive-by downloads or as an attachment to phony e-mails disguised as legitimate messages from various business, such as fake FedEx and UPS tracking notifications. When a user opens such a message, CryptoLocker installs itself on the user's system, scans the hard drive, and encrypts certain file types, such as images, documents and spreadsheets. CryptoLocker then launches a window displaying a demand for ransom (to be paid in less-traceable forms such as Bitcoins and Green Dot Moneypaks) and a countdown timer showing the date and time before which the user must submit payment in order to obtain the decryption key before it is destroyed” (snopes.com)


The three Hoax viruses are:

            Windows Live Update—“warning about messages bearing attachments entitled "Windows Live Update" or "Archive (Windows Live)" that harbor a computer virus which will "burn your whole hard drive" if activated is nothing but a recycling of an old hoax that has been circulating in various languages since at least as far back as the year 2000. The verbiage is lifted directly from similarly phony computer virus warnings distributed under names such as "Invitation," "Olympic Torch," "A Card for You," and "Black in the White House." The bottom line is that no such (incurable) computer virus exists, has been identified by McAfee, or was reported on by CNN.” (snopes.com)

            Breaking Dawn—“scammers were tricking people into a "survey scam" by clickjacking those that attempted to access a fictitious game named Twilight: Breaking Dawn. The "Play Now" button in the enticing graphic sent out a "like" message to the clicker's address book, thus spreading the scam to further potential victims. As for the person who clicked the button, he was instead taken to a "Complete this survey" page, on the promise that once he did so, he'd be allowed to get to the game.” (snopes.com)

            New Gifts for you—“virus began spreading via Facebook posts in August 2010, with those posts claiming that the virus manifested itself by going through Facebook comments and sending out messages in the Facebook account holder's name, using provocative subject lines such as "I know you will like this" and "Looking for some fun" in order to lure

recipients into clicking on the enclosed link (one which promises "New gifts for you" but instead infects the user's computer with the virus). However, this warning seems to be nothing more than a hoax spread by well-meaning but credulous Facebook users. None of the major computer security/anti-virus software companies have reported any users' encountering malware which reached them in such a fashion, and despite the claim that the virus is being spread through links that "are popping up everywhere," the only places the referenced phrases (i.e., "I know you will like this," "Looking for some fun," and "New Gifts for You") are appearing on the Internet in relation to a supposed virus is in posts or forwarded e-mails that are either reproducing the spurious warning or questioning its validity” (snopes.com)