question_answer 1) Usually, installation files have the extension _____.
A)
.jpeg
done
clear
B)
.gif
done
clear
C)
.exe
done
clear
D)
.doc
done
clear
E)
.bng
done
clear
View Answer play_arrow
question_answer 2) ____ tags on goods enable the tracking of the good electronically.
A)
ASTM
done
clear
B)
GPS
done
clear
C)
RFID
done
clear
D)
ISP
done
clear
E)
1MB
done
clear
View Answer play_arrow
question_answer 3) Devices, such as monitors and printers, that are connected to the computer are called _____
A)
processing devices
done
clear
B)
system devices
done
clear
C)
input devices
done
clear
D)
peripheral devices
done
clear
E)
attachment devices
done
clear
View Answer play_arrow
question_answer 4) RAM is considered volatile storage, which means it is _____.
A)
random
done
clear
B)
optional
done
clear
C)
permanent
done
clear
D)
read only
done
clear
E)
temporary
done
clear
View Answer play_arrow
question_answer 5) Which of the following do digital signatures provide?
A)
Confidentiality and integrity of data
done
clear
B)
Confidentiality
done
clear
C)
Authentication and confidentiality of data
done
clear
D)
Authentication and integrity of data
done
clear
E)
Authentication and avail ability of data
done
clear
View Answer play_arrow
question_answer 6) If you copy and paste a file
A)
The original file remains unchanged and a new file is not created.
done
clear
B)
The original file remains unchanged and a new file is created.
done
clear
C)
The original file is deleted and the new file is created.
done
clear
D)
The original file is removed and a new file is not created.
done
clear
E)
The file gets scanned.
done
clear
View Answer play_arrow
question_answer 7) An Internet technology environment that sends information to a user without an explicit request from the user is
A)
Infoware
done
clear
B)
Push
done
clear
C)
Pull
done
clear
D)
F202C
done
clear
E)
Wiki
done
clear
View Answer play_arrow
question_answer 8) Any ______ appearing on a web page opens another document when clicked.
A)
heading
done
clear
B)
hyperlink
done
clear
C)
URL
done
clear
D)
reference
done
clear
E)
anchor
done
clear
View Answer play_arrow
question_answer 9) Which of the following is the correct sequence, the unit of digital information, smallest to largest?
A)
kilobyte, gigabyte, megabyte. Terabyte
done
clear
B)
megabyte, terabyte, kilobyte, gigabyte
done
clear
C)
kilobyte, megabyte, terabyte, gigabyte
done
clear
D)
megabyte, kilobyte, gigabyte, terabyte
done
clear
E)
kilobyte, megabyte, gigabyte, terabyte
done
clear
View Answer play_arrow
question_answer 10) Which of the following will you consider as most secure?
A)
Login phrase
done
clear
B)
Login numeral
done
clear
C)
Password
done
clear
D)
Login ID
done
clear
E)
One Time Password
done
clear
View Answer play_arrow
question_answer 11) _____ are specially designed computers that perform complex calculation extremely rapidly.
A)
Supercomputers
done
clear
B)
Servers
done
clear
C)
Mainframes
done
clear
D)
Desktops
done
clear
E)
Laptops
done
clear
View Answer play_arrow
question_answer 12) Which of the following refers to programs stored in ROM?
A)
Hardware
done
clear
B)
Programme efforts
done
clear
C)
Firmware
done
clear
D)
Peripheral
done
clear
E)
Software
done
clear
View Answer play_arrow
question_answer 13) Which of the following refers to restarting the system when it is already powered on?
A)
a strong boot
done
clear
B)
a warm boot
done
clear
C)
a cold boot
done
clear
D)
hibernation
done
clear
E)
standby mode
done
clear
View Answer play_arrow
question_answer 14) ______ bits equal one byte.
A)
Eight
done
clear
B)
One thousand
done
clear
C)
Four
done
clear
D)
Two
done
clear
E)
One million
done
clear
View Answer play_arrow
question_answer 15) A(n) _____analyses and executes ach one of source in succession, without looking at the entire program.
A)
operating system
done
clear
B)
Computer
done
clear
C)
Interpreter
done
clear
D)
Utility
done
clear
E)
Device driver
done
clear
View Answer play_arrow
question_answer 16) In a microcomputer system the CPU is contained on single chip called the
A)
ROM
done
clear
B)
control
done
clear
C)
ALL
done
clear
D)
semiconductors
done
clear
E)
microprocessor
done
clear
View Answer play_arrow
question_answer 17) An EULA in computing stands for
A)
End-Use License Arrangement
done
clear
B)
Environmental Use Licensing Agreement
done
clear
C)
End-User License Agreement
done
clear
D)
Everyday-User Learning Assistance
done
clear
E)
Employee Use Legal regalement
done
clear
View Answer play_arrow
question_answer 18) Storage that retains its data after the power is turned off is referred to as
A)
Sequential storage
done
clear
B)
non-volatile storage
done
clear
C)
volatile storage
done
clear
D)
direct storage
done
clear
E)
non- destructive storage
done
clear
View Answer play_arrow
question_answer 19) The individual dots that form the Image on a monitor are
A)
bits
done
clear
B)
bytes
done
clear
C)
pixels
done
clear
D)
picas
done
clear
E)
pitens
done
clear
View Answer play_arrow
question_answer 20) Which of the following is an electronic or paper log used to track computer activity?
A)
Weblog
done
clear
B)
Trace route
done
clear
C)
Monitor
done
clear
D)
Cookie
done
clear
E)
Audit trail
done
clear
View Answer play_arrow
question_answer 21) FTP in computing stands for
A)
File Transfer Project
done
clear
B)
File Tagging Program
done
clear
C)
File Transfer Program
done
clear
D)
File Transfer Protocol
done
clear
E)
File Tagging Protocol
done
clear
View Answer play_arrow
question_answer 22) In the e-mail address e-mail address abc@xyz.edu. "abc" is the
A)
User name
done
clear
B)
password
done
clear
C)
client computer
done
clear
D)
server name
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 23) If you change Windows 98 operating system to Windows XP you are actually performing
A)
Pushup
done
clear
B)
Pulldown
done
clear
C)
Patch
done
clear
D)
Upgrade
done
clear
E)
Update
done
clear
View Answer play_arrow
question_answer 24) Security procedures can___.
A)
reduce but not eliminate
done
clear
B)
be inaccessible for the average home user
done
clear
C)
eliminate all computer security risks
done
clear
D)
dissuade computer usage
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 25) _____ refers to the unauthorized copying and distribution of software.
A)
Software piracy
done
clear
B)
Plagiarism
done
clear
C)
Hacking
done
clear
D)
Software literacy
done
clear
E)
Cracking
done
clear
View Answer play_arrow
question_answer 26) Which of the following refers to an upside down mouse?
A)
Trackwell
done
clear
B)
Trackboard
done
clear
C)
Trackball
done
clear
D)
Trackpoint
done
clear
E)
Trackpad
done
clear
View Answer play_arrow
question_answer 27) Which of the following users tunneling protocol to securely send private network data over the Internet?
A)
VPN
done
clear
B)
WAN
done
clear
C)
LAN
done
clear
D)
GPS
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 28) Which of the following devices sends and receives data over telephone lines to and from computers?
A)
sound card
done
clear
B)
speaker
done
clear
C)
expansion slot
done
clear
D)
printer
done
clear
E)
modem
done
clear
View Answer play_arrow
question_answer 29) Which of the following refers to a technique for intercepting computer communications?
A)
Phishing
done
clear
B)
Spoofing
done
clear
C)
Pretexting
done
clear
D)
Hacking
done
clear
E)
Sniffing
done
clear
View Answer play_arrow
question_answer 30) The potential impact of a threat on a system is called as its
A)
danger potential
done
clear
B)
degree of harm
done
clear
C)
susceptibility
done
clear
D)
vulnerabilities
done
clear
E)
countermeasures
done
clear
View Answer play_arrow
question_answer 31) Which technology allows users to shift their desktop computing activities to computers on the Internet?
A)
Cloud computing
done
clear
B)
solid-state storage
done
clear
C)
distributed databases
done
clear
D)
centralized databases
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 32) Converting the computer language ofi's and &'s to characters that a person can understand is called
A)
generating
done
clear
B)
decoding
done
clear
C)
selecting
done
clear
D)
creating clip art
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 33) Which system conversion involves running the old and new system?
A)
Pilot conversion
done
clear
B)
Direct conversion
done
clear
C)
Parallel conversion
done
clear
D)
Convergent conversion
done
clear
E)
Phased conversion
done
clear
View Answer play_arrow
question_answer 34) Every host computer on the Internet has a(n} _______.
A)
unique IP address
done
clear
B)
unique 10 digit number
done
clear
C)
similar IP address
done
clear
D)
unique 15 digit number
done
clear
E)
None of these
done
clear
View Answer play_arrow
question_answer 35) Which of the following is/are effective controls for detecting duplicate transactions such as payments made or received?
A)
Concurrency controls and Referential integrity controls
done
clear
B)
Concurrency controls
done
clear
C)
Reasonableness checks
done
clear
D)
Time stamps
done
clear
E)
Referential integrity controls
done
clear
View Answer play_arrow
question_answer 36) Authorization is best characterized as _______.
A)
Certifying a user's authority
done
clear
B)
Providing access to a resource according to the principle of least privilege
done
clear
C)
Ensuring maximum utilization of resources
done
clear
D)
Authenticating a user's identity with a password
done
clear
E)
A user providing an identity and a password
done
clear
View Answer play_arrow
question_answer 37) What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or food?
A)
Hot site
done
clear
B)
Warm site
done
clear
C)
Disaster recovery cost curve
done
clear
D)
Buffer plan
done
clear
E)
Disaster recovery plan
done
clear
View Answer play_arrow
question_answer 38) TCP/IP stands-tor' _____.
A)
Translation Computing Procedures/ International Protocol
done
clear
B)
Transmitter Control Protocol/ Internet Protocol
done
clear
C)
Transmission Contror Trocedures/ Internet Procedures
done
clear
D)
Transmission Control Protocol/ Internet Protocol
done
clear
E)
Transaction Computing Printing/ Internet Processing
done
clear
View Answer play_arrow
question_answer 39) ______ is a group of servers that share work and may be able to back each other up if one server fails.
A)
tiger team
done
clear
B)
channel bank
done
clear
C)
cluster
done
clear
D)
logical unit
done
clear
E)
server less back up
done
clear
View Answer play_arrow
question_answer 40) _____ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
A)
Sequence
done
clear
B)
Semantics
done
clear
C)
Syntax
done
clear
D)
Serial
done
clear
E)
None of these
done
clear
View Answer play_arrow