Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
Security: A Computer Virus cannot be contracted by which of the below.
1. Floppy diskette
2. E-mail
3. Scanner
4. Internet Downloads
The answer was a scanner, it's unlkely but I'd have to question how accurate this is.
Quote:
Although a hardware scanner inputs data into the computer from a hard copy, it's impossible for a virus to infect the computer because the text is either made into an image or as plain-text.
You only need to find the weakness in the system. For example a few years back there was exploit that used the exif/iptc information in images. This wouldn't specifically apply here but as another example there was an exploit in PHP for uploads, someone could upload imagename.php.jpg. If you didn't validate and only relied on the extension for validation once uploaded that file would be executed as a PHP script.
Add to that scanners are much more complex these days, hard drives, formats that are exploitable etc.
Total questions answered: 141 Total questions answered correctly: 85 Total questions answered incorrectly: 56 Your overall percent: 60% Your rating: Computer Professional
Hardware killed me.
Total questions answered: 141
Total questions answered correctly: 90
Total questions answered incorrectly: 51
Your overall percent: 63%
Your rating: Computer Professional
Date completed: May 1, 2012
Definition: 6 of 9
Hardware: 29 of 39
Security: 5 of 5
Internet: 11 of 12
MS-DOS: 1 of 4
Software: 9 of 13
Windows: 5 of 9
Network: 6 of 13
Linux: 3 of 8
Program: 3 of 8
Web design: 6 of 7
History: 2 of 9
People: 1 of 1
Apple: 3 of 4
I kinda rushed through it, but I don't think I'd get that much better.
The answer was a scanner, it's unlkely but I'd have to question how accurate this is.
You only need to find the weakness in the system. For example a few years back there was exploit that used the exif/iptc information in images. This wouldn't specifically apply here but as another example there was an exploit in PHP for uploads, someone could upload imagename.php.jpg. If you didn't validate and only relied on the extension for validation once uploaded that file would be executed as a PHP script.
Add to that scanners are much more complex these days, hard drives, formats that are exploitable etc.
Quote:
Originally Posted by JTGJR
Total questions answered: 141 Total questions answered correctly: 85 Total questions answered incorrectly: 56 Your overall percent: 60% Your rating: Computer Professional
Hardware killed me.
I need to retake the test. I keep clicking the wrong answer because this mouse is a POS. I move up and it decides to stop moving about half way through. So far though, I had nineteen right and five wrong.
Total questions answered: 141
Total questions answered correctly: 96
Total questions answered incorrectly: 45
Your overall percent: 68%
Your rating: Computer Professional
Date completed: May 1, 2012
Category results
Definition: 7 of 9
Hardware: 32 of 39
Security: 5 of 5
Internet: 9 of 12
MS-DOS: 3 of 4
Software: 7 of 13
Windows: 5 of 8
Network: 7 of 13
Linux: 3 of 8
Program: 4 of 8
Web design: 6 of 7
History: 3 of 10
People: 1 of 1
Apple: 4 of 4
Seeing as I've never really done much with Linux, I'm surprised I got any right in that category. As far as the history, I could care less.
I'm pretty sure I clicked some right answers only to have it record the wrong one too. Oh well.
Total questions answered: 141
Total questions answered correctly: 121
Total questions answered incorrectly: 20
Your overall percent: 85%
Your rating: Computer Expert
Date completed: May 1, 2012
Category results
Definition: 9 of 9 (100%)
Hardware: 36 of 39 (92%)
Security: 4 of 5 (80%)
Internet: 12 of 12 (100%)
MS-DOS: 4 of 4 (100%)
Software: 11 of 13 (85%)
Windows: 8 of 9 (89%)
Network: 13 of 13 (100%)
Linux: 5 of 8 (63%)
Program: 4 of 8 (50%)
Web design: 6 of 7 (86%)
History: 4 of 9 (44%)
People: 1 of 1 (100%)
Apple: 4 of 4 (100%)
I did the worst on Linux, programming, and history which doesn't surprise me. Some of the history still was trivial stuff from long before my time.
Total questions answered: 141
Total questions answered correctly: 108
Total questions answered incorrectly: 33
Your overall percent: 76%
Your rating: Computer Professional
Date completed: May 1, 2012
Post results to Facebook Wall.
Share
Category results
Definition: 9 of 9
Hardware: 31 of 39
Security: 4 of 5
Internet: 11 of 12
MS-DOS: 4 of 4
Software: 10 of 13
Windows: 5 of 8
Network: 9 of 13
Linux: 4 of 8
Program: 4 of 8
Web design: 6 of 7
History: 8 of 10
People: 1 of 1
Apple: 2 of 4
Please register to post and access all features of our very popular forum. It is free and quick. Over $68,000 in prizes has already been given out to active posters on our forum. Additional giveaways are planned.
Detailed information about all U.S. cities, counties, and zip codes on our site: City-data.com.