Take the test and check your answers that will be displayed at 6P.M. today
(a) Black Composer Copy
(b) Blind Composer Copy
(c) Black Carbon Copy
(d) Blind Carbon Copy
2. A program out performs a useful task while simultaneously allowing destructive acts is a
A. Worm
B. Trojan horse
C. virus
D. macro virus
A. Trojan horse.
B. virus.
C. time bomb
D. tlme-related bomb sequence.
A. Worm
B. Trojan horse
C. virus
D. macro virus
Trojan horses are software programs that masquerade or disguise as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer
3. An Intentionally disruptive program that spreads from program to program or from disk to disk is known as:A. Trojan horse.
B. virus.
C. time bomb
D. tlme-related bomb sequence.
A. Distribution of disk operating system
B. Distributed Denial of Service
C. Distribution of disk services
D. Danger and denial of service
5. The shortcut keys to lock computer is
A. Ctrl + L
B. Ctrl + Tab + L
C. Ctrl + Shift + Delete
D. Ctrl + Alt + Delete
6. Electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo can be achieved by
A. OCR
B. OMR
C. Data scraping
D. None of the above
7. FTP is built on _____ architecture.
a) Client-server
b) P2P
c) Data centric
d) Service oriented
A. Ctrl + L
B. Ctrl + Tab + L
C. Ctrl + Shift + Delete
D. Ctrl + Alt + Delete
6. Electronic or mechanical conversion of images of typed, handwritten or printed text into machine-encoded text, whether from a scanned document, a photo of a document, a scene-photo can be achieved by
A. OCR
B. OMR
C. Data scraping
D. None of the above
7. FTP is built on _____ architecture.
a) Client-server
b) P2P
c) Data centric
d) Service oriented
8. A search engine is a program to search
(1) for information
(2) Web pages
(3) Web pages for specified index terms
(4) Web pages for information using specified search terms
(1) for information
(2) Web pages
(3) Web pages for specified index terms
(4) Web pages for information using specified search terms
9. Internet requires
(1) an international agreement to connect
computers
(2) a local area network
(3) a commonly agreed set of rules to
communicate between computers
(4) a world wide web
(1) an international agreement to connect
computers
(2) a local area network
(3) a commonly agreed set of rules to
communicate between computers
(4) a world wide web
10. What is Telnet?
(1) Network or telephones
(2) Television network
(3) Remote login
(4) All of the above
(1) Network or telephones
(2) Television network
(3) Remote login
(4) All of the above
1. Ans. D) Blind carbon copy
Bcc stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address
2. Answer: B. Trojan horse
3. Answer: B. Virus
4.Ans. B. Distributed denial of service
5. Ans. D. Ctrl + Alt + Delete
6. Ans. A. OCR - optical character recognition
7. Answer: a) Client-server
Explanation: An FTP connection includes a Server and a Client which wish to share a number of data files. The server can transfer files with multiple clients at the same time while the client communicates with only one server at a time.
8. Ans. (4) Web pages for information using specified search terms
9.Ans. (3) a commonly agreed set of rules to
communicate between computers
10. Ans. (3) Remote login
0 comments:
Post a Comment