1. In the right
setting a thief will steal your information by simply watching what you type.
(a) snagging
(b) spying
(c) social engineering
(d) shoulder surfing
(e) None of these
Ans : (d)
2. A………..is a small
program embedded inside of a GIF image.
(a) web bug
(b) cookie
(c) spyware application
(d) spam
(e) None of these
Ans : (a)
3. A hacker contacts
you my phone or email and attempts to acquire your password
(a) spoofing
(b) phishing
(c) spamming
(d) bugging
(e) None of these
Ans : (b)
4. A hacker that
changes or forges information in an electronic resource, is engaging in………
(a) denial of service
(b) sniffing
(c) terrorism
(d) data diddling
(e) None of these
Ans : (d)
5. Hackers often gain
entry to a network be pretending to be at a legitimate computer.
(a) Spoofing
(b) forging
(c) IP spoofing
(d) ID theft
(e) None of these
Ans : (c)
6. The………..of a threat
measures its potential impact on a system.
(a) vulnerabilities
(b) countermeasures
(c) degree of harm
(d) susceptibility
(e ) None of these
Ans : (c)
7. The power level
drops below 120V.
(a) brownout
(b) spike
(c) blackout
(d) surge
(e) None of these
Ans : (b)
8. Which of the
following is NOT a Microsoft Internet tool or technology?
(a) Dreamweaver
(b) Silverlight
(c) Internet Explorer
(d) Expression Web
(e) None of these
Ans : (a)
9. A protocol used to
control the secure sending of data on the internet is :
(a) SMTP
(b) HTTPS
(c) TCP/IP
(d) HTTP
(e) None of these
Ans : (b)
10. Programs from the
same developer sold bundled together, that provide better integration and share
common features, toolbars and menus are known as ………..
(a) software suites
(b) integrated software packages
(c) software processing packages
(d) personal information managers
(e) None of these
Ans : (a)
11. ……………terminals
(formerly known as cash registers) are often connected to complex inventory and
sales computer systems.
(a) Data
(b) Sales
(c) Query
(d) Point-of-Sale (POS)
(e) None of these
Ans : (a)
12. The OSI model is
divided into…………processes called layers.
(a) five
(b) six
(c) seven
(d) eight
(e) None of these
Ans : (c)
13.………..are specially
designed computer chips reside inside other devices, such as your car or your
electronic thermostat.
(a) Servers
(b) Embedded computers
(c) Robotic computers
(d) Mainframes
(e) None of these
Ans : (b)
14. In a ring
topology, the computer in possession of the………can transmit data
(a) packet
(b) data
(c) access method
(d) token
(e) None of these
Ans : (d)
15. Viruses are often
transmitted by a floppy disk left in the floppy drive
(a) Trojan horse
(b) Boot sector
(c) Script
(d) Logic bomb
(e) None of these
Ans : (b)
16. A database
management system (DBMS) is a………..
(a) hardware system used to create, maintain and provide controlled access to a database
(b) hardware system used to create, maintain, and provide uncontrolled access to a database.
(c) software system used to create, maintain, and provide uncontrolled access to a database.
(d) software system used to create, maintain, and provide controlled access to a database.
(e) None of these
Ans : (d)
17. A Proxy server is
used for which of the following?
(a) To provide security against unauthorized users
(b) To process client requests for web pages
(c) To process client requests for database access
(d) To provide TCP/IP
(e) None of these
Ans : (b)
18. ……….are words
that a programming language has set aside for its own use.
(a) Control words
(b) Reserved words
(c) Control structures
(d) Reserved keys
(e) None of these
Ans : (b)
19. What is the
primary difference between a virus and a worm?
(a) A worm has the ability to self-propagate from an infected user’s computer to other computers
(b) A worm is usually written by a cracker : Script bunnies do not have the skills to develop worm program
(c) A virus is very harmful to the computers it infects; a worm is not a serious a problem
(d) Anti-virus software is effective in fighting viruses but not worms
(e) None of these
Ans : (c)
20. describe what is
database fields.
(a) Structures
(b) Field markers
(c) Field definition
(d) Field names
(e) None of these
Ans : (d)
21. A goal of
normalization is to………….
(a) minimize the number of relationships
(b) minimize the number of entities
(c) minimize the number of tables
(d) minimize the number of redundancy
(e) None of these
Ans : (d)
22. A(n)………….uses
pictures (called icons) and menus displayed on the screen to send commands to
the computer system.
(a) command-based user interface
(b) GUI
(c) system utility
(d) API
(e) None of these
Ans : (b)
23. Communication
using a modulated carrier to apply a data signal to a transmission medium in
analog form is
(a) Local area network
(b) Modem
(c) Base band networking
(d) Broad band networking
(e) None of these
Ans : (d)
24. ‘ITS’ stands for
(a) Intelligent Teaching Systems
(b) International Tutoring Systems
(c) Intelligent Tutoring Systems
(d) All of these
(e) None of these
Ans : (c)
25. Any piece of equipment forming an interface to
a data communication system is
(a) DTE
(b) DTA
(c) CSA
(d) DCA
(e) None of these
Ans : (b)
No comments:
Post a Comment