Under: Listening

Computer Virus | IELTS Listening + Answers

Updated on:
Difficulty Level: Medium
Computer Virus IELTS Listening Mock Test Simulator - Solved Answer Online - ieltstest.services - IELTS TEST SERVICES - ITS

IELTS Listening Practice Test

Questions 1-5

Choose the correct letter, A, B or C.

1. What does the speaker compare a computer virus to?

  • A. a biological organism
  • B. a corrupt program
  • C. an irritating person

2. Core Wars was designed as

  • A. a model virus.
  • B. a form of amusement.
  • C. a low-cost program.

3. The speaker says that computer viruses are picked up because they can

  • A. infiltrate programs by themselves.
  • B. be sold with commercial software.
  • C. hide in unofficial software.

4. What does the speaker find surprising?

  • A. the rise in the number of software infections
  • B. the determination of those who develop viruses
  • C. the fact that people blame their own computers

5. The worst aspect of a Trojan horse virus is its capacity to

  • A. delete all the files on your computer.
  • B. send illegal emails to all your correspondents.
  • C. perform operations in your name.

Questions 6-9

List FOUR ways of combating viruses.

Write NO MORE THAN THREE WORDS for each answer.

6.

7.

8.

9.

Question 10

10. How does the speaker feel about computer viruses?

  • A. They are here to stay.
  • B. They serve no purpose.
  • C. They can be avoided.

Questions Attempted

Test Results

Question Your Answer Correct Answer Result

We’re Calculating Your Result

Receive New Test Updates!

Discord Group

Telegram Channel


Solved Answers & Explanation

Question 1: Answer is A

Relevant Line: “It’s known as a virus because, although it’s not a biological organism, it functions in a similar way.”

Analysis: The speaker compares a computer virus to a biological organism, confirming “A” as the correct answer.

Question 2: Answer is B

Relevant Line: “Core Wars was initially created for intellectual entertainment by three Americans.”

Analysis: Core Wars was designed as a form of amusement, supporting “B.”

Question 3: Answer is C

Relevant Line: “They are included in software that you might have got from friends or downloaded from somewhere without knowing its real source.”

Analysis: Viruses hide in unofficial software, making “C” the correct answer.

Question 4: Answer is B

Relevant Line: “Proof that these attackers are going to extremes to do just that … going out of their way to create programs.”

Analysis: The speaker finds the determination of virus developers surprising, confirming “B.”

Question 5: Answer is C

Relevant Line: “A Trojan also allows the attacker to use the victim’s computer to purchase goods with stolen credit cards.”

Analysis: The worst aspect of a Trojan is its ability to perform operations in the victim’s name, supporting “C.”

Question 6: Answer is be very careful

Relevant Line: “Virus programmers succeed because people are not always careful about where they get their programs from.”

Analysis: The first step in combating viruses is to be very careful about software sources.

Question 7: Answer is avoid trouble

Relevant Line: “Avoid any messages which are suspicious-looking. Do not open any message that says ‘I love you’ or ‘Win $50.'”

Analysis: Avoiding suspicious emails helps prevent virus infections, confirming “avoid trouble.”

Question 8: Answer is understand the viruses

Relevant Line: “We need to understand the viruses and how they work.”

Analysis: Understanding viruses is crucial in combating them, supporting the answer “understand the viruses.”

Question 9: Answer is be well prepared

Relevant Line: “There is a good selection of anti-virus software available on the market now.”

Analysis: Using anti-virus software ensures you are well prepared to combat viruses.

Question 10: Answer is C

Relevant Line: “If you follow these basic rules, you really shouldn’t have any problems.”

Analysis: The speaker believes that computer viruses can be avoided, confirming “C” as the answer.

Leave a Comment