1) The common name for the crime of stealing passwords is____________? a. Jacking b. Identity theft c. Spoofing d. Hacking
|
||||
2) Collecting personal information and effectively posing as another individual is known as the crime of_____________? a. Spooling b. Identity theft c. Spoofing d. Hacking
|
||||
3) Malicious software is known as____________? a. Badware b. Malware c. Maliciousware d. Illegalware
|
||||
4) A program that performs a useful task while simultaneously allowing destructive acts is a___________? a. Worm b. Trojan horse c. Virus d. Macro virus
|
||||
5) An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________? a. Trojan horse b. Virus c. Time bomb d. Time-related bomb sequence
|
||||
6) In 1999, the Melissa virus was a widely publicised:____________? a. E-mail virus b. Macro virus c. Trojan horse d. Time bomb
|
||||
7) What type of virus uses computer hosts to reproduce itself? a. Time bomb b. Worm c. Melissa virus d. Macro virus
|
||||
8) The thing that eventually terminates a worm virus is a lack of: a. Memory or disk space b. Time c. CD drives space d. CD-RW
|
||||
9) When a logic bomb is activated by a time-related event, it is known as a____________? a. Time-related bomb sequence b. Virus c. Time bomb d. Trojan horse
|
||||
10) What is the name of an application program that gathers user information and sends it to someone through the Internet? a. A virus b. Spybot c. Logic bomb d. Security patch
|
||||
11) ____________is the measurement of things such as fingerprints and retinal scans used for security access? a. Biometrics b. Bio measurement c. Computer security d. Smart weapon machinery
|
||||
12) What is the most common tool used to restrict access to a computer system? a. User logins b. Passwords c. Computer keys d. Access-control software
|
||||
13) Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________? a. Hacker-proof program b. Firewall c. Hacker-resistant server d. Encryption safe wall
|
||||
14) The scrambling of code is known as___________? a. Encryption b. a firewall c. Scrambling d. Password proofing
|
||||
15) To prevent the loss of data during power failures, use a(n)_____________? a. Encryption program b. Surge protector c. Firewall d. UPS
|
||||
16) __________is defined as any crime completed through the use of computer technology? a. Computer forensics b. Computer crime c. Hacking d. Cracking
|
||||
17) ___________refers to electronic trespassing or criminal hacking? a. Cracking b. Jacking c. Spoofing d. Smarming
|
||||
18) The first electronic computer was developed by____________? a. J.V. Attansoff b. Bill Gates c. Simur Cray d. Winton Serf
|
||||
19) _____________computers operates essentially by counting? a. Portable computer b. Hybrid computer c. Analog computer d. Digital computer
|
||||
20) ____________computer is small general purpose micro computer, but larger than portable computer? a. Hybrid b. Digital c. Desktop d. Laptop
|
||||
21) Cathode Ray Tube is a form of__________? a. Keyboard b. Mouse c. Monitor d. Mother board
|
||||
22) ____________computer is a medium sized computer? a. Micro b. Mainframe c. Super d. Mini
|
||||
23) _________computer are of large size? a. Micro b. Mainframe c. Super d. Mini
|
||||
24) Note book, laptop,palm,hand-held computers are coming under the category of__________computer? a. Digital computer b. Mainframe computer c. Portable computer d. Hybrid computer
|
||||
25) Touch Screen is___________? a. Input device b. Output device c. Both A & B above d. None of these
|
||||
26) ____________are used for plotting graphs and design on papers? a. Trackball b. Joystick c. Light pen d. Plotters
|
||||
27) _______________are specific to users’ needs? a. System software b. Application software c. Assemblers d. Compilers
|
||||
28) “MAN” stands for_______________? a. Maximum Area Network b. Minimum Area Network c. Main Area Network d. Metropolitan Area Network
|
||||
29) Which of the following is a network topology? a. LAN b. WAN c. MAN d. BUS
|
||||
30) VOIP stands for___________? a. Voice over IP b. Video over IP c. Viruses over IP d. Virtual over IP
|
||||
31) LAN stands for______________? a. Limited Area Network b. Logical Area Network c. Local Area Network d. Large Area Network
|
||||
32) _____________are set of rules and procedures to control the data transmission over the internet? a. IP address b. Domains c. Protocol d. Gateway
|
||||
33) NOS stands for______________? a. Node operating system b. Non-open software c. Network Operating system d. Non-operating software
|
||||
34) _______________are system software to facilitate editing of text and data? a. MS Word b. Editors c. PowerPoint d. MS publisher
|
||||
35) Computers, combine both measuring and counting, are called________________? a. Analog b. Digital c. Hybrid d. All of these
|
||||
36) In world today, most of the computers are_____________? a. Digital b. Hybrid c. Analog d. Complex
|
||||
37) physical structure of computer is called____________? a. Software b. Hardware c. Human ware d. All of these
|
||||
38) In which type of computer, data are represented as discrete signals? a. Analog computer b. Digital computer c. both d. Hybrid Computer
|
||||
39) C’ in CPU denotes___________? a. Central b. Common c. Convenient d. Computer e. None of these
|
||||
40) Which of the following uses a handheld operating system? a. supercomputer b. personal computer c. Laptop d. PDA
|