You are on page 1of 40

1.

In a survey of more than 500 companies and government agencies, ____________ percent
detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security

breaches.

A. $100,000 each

B. $377 million

C. five employees each

D. $1 million

Answer: B

3. The typical computer criminal is a(n):

A. young hacker.

B. trusted employee with no criminal record.

C. trusted employee with a long, but unknown criminal record.

D. overseas young cracker.

Answer: B

4. The majority of computer crimes are committed by:

A. hackers.

B. insiders.

C. overseas criminals.

D. young teenage computer geniuses.

Answer: B

5. The common name for the crime of stealing passwords is:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime

of:

A. spooling.

B. identity theft.
C. spoofing.

D. hacking.

Answer: B

7. Malicious software is known as:

A. badware.

B. malware.

C. maliciousware.

D. illegalware.

Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:

A. worm.

B. Trojan horse.

C. virus.

D. macro virus.

Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is

known as a:

A. Trojan horse.

B. virus.

C. time bomb.

D. time-related bomb sequence.

Answer: B

10. In 1999, the Melissa virus was a widely publicized:

A. e-mail virus.

B. macro virus.

C. Trojan horse.

D. Time bomb.

Answer: A

11. What type of virus uses computer hosts to reproduce itself?

A. Time bomb

B. Worm

C. Melissa virus
D. Macro virus

Answer: B

12. The thing that eventually terminates a worm virus is a lack of:

A. memory or disk space.

B. time.

C. CD drive space.

D. CD-RW.

Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

15. What is the name of an application program that gathers user information and sends it to

someone through the Internet?

A. A virus

B. Spybot

C. Logic bomb

D. Security patch

Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread

of viruses:

A. more complicated.

B. more difficult.

C. easier.
D. slower.

Answer: C

17. HTML viruses infect:

A. your computer.

B. a Web page in the HTML code.

C. both a Web page and the computer that is viewing it.

D. No

Answer: B

18. Software programs that close potential security breaches in an operating system are known as:

A. security breach fixes.

B. refresh patches.

C. security repairs.

D. security patches.

Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is

known as:

A. a virus.

B. a Trojan horse.

C. cracking.

D. a denial of service attack.

Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for

security access.

A. Biometrics

B. Biomeasurement

C. Computer security

D. Smart weapon machinery

Answer: A

21. What is the most common tool used to restrict access to a computer system?

A. User logins

B. Passwords

C. Computer keys
D. Access-control software

Answer: B

22. The most common passwords in the U.S. or Britain include all EXCEPT:

A. love.

B. Fred.

C. God.

D. 123.

Answer: D

23. Hardware or software designed to guard against unauthorized access to a computer network is

known as a(n):

A. hacker-proof program.

B. firewall.

C. hacker-resistant server.

D. encryption safe wall.

Answer: B

24. The scrambling of code is known as:

A. encryption.

B. a firewall.

C. scrambling.

D. password-proofing.

Answer: A

25. If you want to secure a message, use a(n):

A. cryptology source.

B. encryption key.

C. encryption software package.

D. cryptosystem.

Answer: D Reference: How It Works: 10.2 Cryptography

26. To prevent the loss of data during power failures, use a(n):

A. encryption program.

B. surge protector.

C. firewall.
D. UPS.

Answer: D

27. A(n) ____________ can shield electronic equipment from power spikes.

A. encryption program

B. surge protector

C. firewall

D. UPS

Answer: B

28. All of these are suggestions for safe computing EXCEPT:

A. don’t borrow disks from other people.

B. open all e-mail messages but open them slowly.

C. download shareware and freeware with caution.

D. disinfect your system.

Answer: B

29. Freeware ___________ encrypts data.

A. encryption

B. firewall software

C. PGP

D. private and public keys

Answer: C

30. ____________ is defined as any crime completed through the use of computer technology.

A. Computer forensics

B. Computer crime

C. Hacking

D. Cracking

Answer: B

31. Most computer systems rely solely on ___________ for authentication.

A. logins

B. passwords

C. encryption

D. lock and key

Answer: B
32. Creating strong computer security to prevent computer crime usually simultaneously helps

protect :

A. privacy rights.

B. personal ethics.

C. the number of cookies downloaded to your personal computer.

D. personal space.

Answer: A

33. Over ___________ was spent by businesses and government to repair problems in regard to

Y2K.

A. 20 million dollars

B. 100 million dollars

C. 1 billion dollars

D. 100 billion dollars

Answer: D

34. What is a complex system that takes on nearly complete responsibility for a task eliminating the

need for people, verification, or decision making?

A. Autonomous system

B. Missile defense auto-system

C. Smart weapon

D. Independent system

Answer: D

35. Security procedures can:

A. will eliminate all computer security risk.

B. reduce but not eliminate risks.

C. are prohibitively expensive.

D. are inaccessible for the average home user.

Answer: B

Fill in the Blank:

36. The field of computer ____________ uses special software to scan hard drives of potential

criminal suspects.

Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging


37. Computer ____________ often goes unreported because businesses fear negative publicity.

Answer: crime

38. ____________ connections are the most frequent point of attack for Internet commerce.

Answer: Internet

39. ____________ is the most common form of computer crime.

Answer: Theft

40. A survey by eMarketer.com found that ____________ are the most often cited online fraud

cases.

Answer: online auctions Reference: Identity Theft

41. Theft of computers is most common for PDAs and ____________ computers.

Answer: notebook

42. When you use a disk in several different computers within the same day, you are taking the

chance of contracting a(n) ____________.

Answer: virus Reference: Viruses Difficulty: Easy

43. A(n) ____________ attaches itself to documents that contain embedded programs that

automate tasks.

Answer: macro virus

44. Both viruses and ____________ use computer hosts to replicate.

Answer: worms

45. ____________ programs search for and eliminate viruses.

Answer: Antivirus

46. A security patch is a software program that closes possible security breaches in the operating

system. The cost to the consumer is ____________.

Answer: nothing or free

47. ____________ was once the word used for malicious computer wizardry.

Answer: Hackers or hacking

48. ____________ refers to electronic trespassing or criminal hacking.

Answer: Cracking
49. DoS stands for ___________.

Answer: denial of service

50. DDoS stands for ___________.

Answer: distributed denial of service

51. ____________ hijack Web pages and redirect users to other sites.

Answer: Webjackers

52. ___________ software monitors and records computer transactions.

Answer: Audit-control

53. Each individual who uses a public key cryptosystem has ___________ keys.

Answer: two Reference: How It Works: 10.2 Cryptography

54. PGP stands for ___________.

Answer: Pretty Good Privacy

55. Most operating systems, including Windows XP, assign each user a unique ___________.

Answer: user identifier or user ID

56. It should now be common knowledge that users should not open ___________ from e-mail

recipients that the user does not know.

Answer: attachments

Matching:

57. Match the acts and centers with their purposes:

I. Computer Fraud and Abuse Act A. created by Attorney General Janet Reno in 1998

II. USA Patriot Act B. defines what kinds of communications are legal online

III. Digital Millennium Copyright Act C. created in 2001 as a response to the terrorist attacks of

September 11, 2001

IV. Telecommunications Act of 1996 D. provides instant information on crimes and criminals

V. Communications Decency Act E. declared unconstitutional by the Supreme Court

VI. National Infrastructure Protection Center F. created as a result of the first headline-making

worm

VII. National Crime Information Center G. used to arrest a student for writing to crack an Adobe

product

Answers: F, C, G, B, E, A, D
58. Match the following rules of thumb about safe computing with the proper descriptions:

I. share with care A. be aware of e-mail from what appear to be legitimate companies

II. handle e-mail carefully B. don’t choose a dictionary word

III. disinfect regularly C. keep your disks in your own computer

IV. take your password seriously D. copy, copy, copy

V. if it’s important, back it up E. encrypt

VI. sensitive info over the Internet? F. use antivirus software

Answers: C, A, F, B, D, E

1. All of the following are examples of real security and privacy risks EXCEPT:

A. hackers.

B. spam.

C. viruses.

D. identity theft.

Answer: B

2. A process known as ____________ is used by large retailers to study trends.

A. data mining

B. data selection

C. POS

D. data conversion

Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex

inventory and sales computer systems.

A. Data

B. Point-of-sale (POS)

C. Sales

D. Query

Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag

and pulls up the current price (and any special offers) as you shop.

A. PSS

B. POS
C. inventory

D. data mining

Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an

example of a law enforcement specialty called:

A. robotics.

B. simulation.

C. computer forensics.

D. animation.

Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?

A. gathering data

B. processing data into information

C. analyzing the data or information

D. storing the data or information

Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all

of the animal’s movements.

A. POS

B. RFID

C. PPS

D. GPS

Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of

manually. This technology is known as:

A. robotics.

B. computer forensics.

C. simulation.

D. forecasting.

Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:

A. proprietary.
B. open.

C. experimental.

D. in the public domain.

Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100

nanometers.

A. Nanoscience

B. Microelectrodes

C. Computer forensics

D. Artificial intelligence

Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of

intelligence that humans do.

A. Nanoscience

B. Nanotechnology

C. Simulation

D. Artificial intelligence (AI)

Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.

A. A process

B. Software

C. Storage

D. Information

Answer: D

13. The name for the way that computers manipulate data into information is called:

A. programming.

B. processing.

C. storing.

D. organizing.

Answer: B

14. Computers gather data, which means that they allow users to ____________ data.

A. present
B. input

C. output

D. store

Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual

print of the picture is considered:

A. data.

B. output.

C. input.

D. the process.

Answer: B

16. Computers use the ____________ language to process data.

A. processing

B. kilobyte

C. binary

D. representational

Answer: C

17. Computers process data into information by working exclusively with:

A. multimedia.

B. words.

C. characters.

D. numbers.

Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is

made up of a unique combination of:

A. eight bytes.

B. eight kilobytes.

C. eight characters.

D. eight bits.

Answer: D

19. The term bit is short for:

A. megabyte.
B. binary language.

C. binary digit.

D. binary number.

Answer: C

20. A string of eight 0s and 1s is called a:

A. megabyte.

B. byte.

C. kilobyte.

D. gigabyte.

Answer: B

21. A ____________ is approximately one billion bytes.

A. kilobyte

B. bit

C. gigabyte

D. megabyte

Answer: C

22. A ____________ is approximately a million bytes.

A. gigabyte

B. kilobyte

C. megabyte

D. terabyte

Answer: C

23. ____________ is any part of the computer that you can physically touch.

A. Hardware

B. A device

C. A peripheral

D. An application

Answer: A

24. The components that process data are located in the:

A. input devices.

B. output devices.

C. system unit.
D. storage component.

Answer: C

25. All of the following are examples of input devices EXCEPT a:

A. scanner.

B. mouse.

C. keyboard.

D. printer.

Answer: D

26. Which of the following is an example of an input device?

A. scanner

B. speaker

C. CD

D. printer

Answer: A

27. All of the following are examples of storage devices EXCEPT:

A. hard disk drives.

B. printers.

C. floppy disk drives.

D. CD drives.

Answer: B

28. The ____________, also called the “brains” of the computer, is responsible for processing

data.

A. motherboard

B. memory

C. RAM

D. central processing unit (CPU)

Answer: D

29. The CPU and memory are located on the:

A. expansion board.

B. motherboard.

C. storage device.
D. output device.

Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:

A. application software.

B. system software.

C. operating system software.

D. platform software.

Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.

A. An instruction

B. Software

C. Memory

D. A processor

Answer: B

32. System software is the set of programs that enables your computer’s hardware devices and

____________ software to work together.

A. management

B. processing

C. utility

D. application

Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:

A. platforms.

B. applications.

C. programs.

D. storage devices.

Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different

operating systems.

A. languages

B. methods

C. CPUs
D. storage devices

Answer: C

35. Servers are computers that provide resources to other computers connected to a:

A. network.

B. mainframe.

C. supercomputer.

D. client.

Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.

A. supercomputers

B. clients

C. laptops

D. mainframes

Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely

rapidly.

A. Servers

B. Supercomputers

C. Laptops

D. Mainframes

Answer: B

38. DSL is an example of a(n) ____________ connection.

A. network

B. wireless

C. slow

D. broadband

Answer: D

39. The difference between people with access to computers and the Internet and those without this

access is known as the:

A. digital divide.

B. Internet divide.

C. Web divide.
D. broadband divide.

Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an

extremely small scale.

A. Nanotechnology

B. Micro-technology

C. Computer forensics

D. Artificial intelligence

Answer: A

41. Which of the following is the correct order of the four major functions of a computer?

A. Process à Output à Input à Storage

B. Input à Outputà Process à Storage

C. Process à Storage à Input à Output

D. Input à Process à Output à Storage

Answer: D

42. ____________ bits equal one byte.

A. Eight

B. Two

C. One thousand

D. One million

Answer: A

43. The binary language consists of ____________ digit(s).

A. 8

B. 2

C. 1,000

D. 1

Answer: B

44. A byte can hold one ____________ of data.

A. bit

B. binary digit

C. character
D. kilobyte

Answer: C

45. ____________ controls the way in which the computer system functions and provides a means

by which users can interact with the computer.

A. The platform

B. The operating system

C. Application software

D. The motherboard

Answer: B

46. The operating system is the most common type of ____________ software.

A. communication

B. application

C. system

D. word-processing software

Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as

your car or your electronic thermostat.

A. Servers

B. Embedded computers

C. Robotic computers

D. Mainframes

Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon,

are called:

A. instructions.

B. the operating system.

C. application software.

D. the system unit.

Answer: A

49. The two broad categories of software are:

A. word processing and spreadsheet.

B. transaction and application.


C. Windows and Mac OS.

D. system and application.

Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:

A. system unit.

B. CPU.

C. mainframe.

D. platform.

Answer: A

Fill in the Blank:-

51. Between PCs and Macs, the ____________ is the platform of choice for graphic

design and animation.

Answer: Mac

52. The ____________ is the program that manages the hardware of the computer

system, including the CPU, memory, storage devices, and input/output devices.

Answer: operating system

53. The type of operating system software you use depends on your computer’s

____________.

Answer: platform

54. ____________software helps you carry out tasks, such as typing a document or

creating a spreadsheet.

Answer: Application

55. ____________are the fastest and most expensive computers.

Answer: Supercomputers

56. A ____________ is approximately 1,000 bytes.

Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process

data, and these steps and tasks are called ____________.

Answer: instructions
58. A computer gathers data, processes it, outputs the data or information, and

____________ the data or information.

Answer: stores

59. The binary language consists of two digits: ____________ and ____________.

Answer: 0 and 1

60. A string of ____________ 0s and 1s is called a byte.

Answer: eight (8)

61. The devices you use to enter data into a computer system are known as

____________ devices.

Answer: input

62. The devices on a computer system that let you see the processed information are

known as ____________ devices.

Answer: output

63. ____________ is the set of computer instructions or programs that enables the

hardware to perform different tasks.

Answer: Software

64. When you connect to the ____________, your computer is communicating with a

server at your Internet service provider (ISP).

Answer: Internet

65. ____________ are computers that excel at executing many different computer

programs at the same time.

Answer: Mainframes

66. ____________is the application of computer systems and techniques to gather legal

evidence.

Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the

human thought process.

Answer: Artificial intelligence (AI)


68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs

generally run ____________ as an operating system.

Answer: Microsoft Windows

69. A process known as ____________ tracks trends and allows retailers to respond to

consumer buying patterns.

Answer: data mining

70. Hard disk drives and CD drives are examples of ____________ devices.

Answer: storage

71. You would use ____________ software to create spreadsheets, type documents, and

edit photos.

Answer: application

72. ____________ are computers that support hundreds or thousands of users

simultaneously.

Answer: Mainframes

73. ____________ is the term given to the act of stealing someone’s identity and

ruining their credit rating.

Answer: Identity theft

74. Surgeons are using ____________ to guide robots to perform delicate surgery.

Answer: computers

75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat

and respond to procedures just like humans.

Answer: simulators

True and False

76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.

Answer: True

77. Data can be a number, a word, a picture, or a sound.

Answer: True

78. Strictly defined, a computer is a data processing device.

Answer: True
79. The discrepancy between the “haves” and “have-nots” with regard to

computer technology is commonly referred to as the digital society.

Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and

consumer and knowing how to avoid viruses, the programs that posethreats to computer

security.

Answer: True

81. Trend-spotting programs, developed for business, have been used to predict criminal

activity.

Answer: True

82. Employers do not have the right to monitor e-mail and network traffic on employee

systems used at work.

Answer: False

83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.

Answer: True

84. Output devices store instructions or data that the CPU processes.

Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called

the motherboard.

Answer: True

86. Nanostructures represent the smallest human-made structures that can be built.

Answer: True

87. The main difference between a supercomputer and a mainframe is that

supercomputers are designed to execute a few programs as quickly as possible,whereas

mainframes are designed to handle many programs running at the same time (but at a

slower pace).

Answer: True

88. Being computer fluent means that you should be able to build a computer yourself.

Answer: False
89. Embedded computers are self-contained computer devices that have their own

programming and do not receive input.

Answer: True

90. A Web browser is a special device that is installed in your computer that allows it to

communicate with other devices on a network.

Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices.

Answer: True

92. The most common type of memory that the computer uses to process data is ROM.

Answer: False (RAM)

Matching:

93. Match the following terms with their approximate size:

I. kilobyte A. one million bytes

II. byte B. eight bits

III. gigabyte C. one thousand bytes

IV. megabyte D. one billion bytes

V. terabyte E. one trillion bytes

Answer: C, B, D, A, E

94. Match the following terms with their meanings:

I. printer A. storage device

II. scanner B. output device

III. RAM C. input device

IV. CPU D. a type of memory

V. CD drive E. processor

Answer: B, C, D, E, A

95. Match the following terms with their meanings:

I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly

II. supercomputer B. a computer that provides resources to other computers connected to a

network

III. embedded computer C. a large, expensive computer that supports hundreds or thousands of

users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such

as temperature control

V. server E. a small mobile computing device

Answer: C, A, D, E, B

96. Match the following terms with their meanings:

I. software A. transforming data into information

II. hardware B. data that has been organized or presented in a meaningful fashion

III. operating system C. any part of the computer that you can physically touch

IV. processing D. a set of computer programs that enables hardware to perform different tasks

V. information E. the most common type of system software, it controls the way in which the

computer system functions

Answer: D, C, E, A, B

97. Match the following terms with their meanings:

I. system software A. the set of programs that enables computer hardware devices and application

software to work together

II. application software B. the kind of operating system software you will use depends on this

III. platform C. operating system software generally used on PCs

IV. Microsoft Windows D. a set of programs used to accomplish a specific task

V. Mac OS E. operating system software used on the Apple Macintosh

Answer: A, D, B, C, E

98. Match the following terms with their meanings:

I. data A. the main circuit board in the system unit

II. memory B. the representation of a fact or idea (unprocessed information)

III. output C. processed data or information

IV. storage D. holds instructions or data that the CPU processes

V. motherboard E. data or information that can be accessed again

Answer: B, D, C, E, A

99. Match the following terms with their meanings:

I. bit A. the science revolving around the use of nanostructures to build devices on an extremely

small scale

II. binary language B. the case that contains the system components

III. instructions C. consists of 0s and 1s

IV. system unit D. short for binary digit


V. nanotechnology E. steps and tasks necessary to process data into usable information

Answer: D, C, E, B, A

100. Match the following fields to the related computer technology:

I. medicine A. Internet research and virtual tours

II. business B. data mining

III. law enforcement C. robotics and simulation

IV. education D. computer forensics

V. archeology E. digital recreations of ruins

Answer: C, B, D, A, E

1. Programs from the same developer , sold bundled together , that provide better integration and

share common features , toolbars and menus are known as ….

(A) software suites

(B) integrated software packages

(C) software processing packages

(D) personal information managers

(E) none of these

2. A data warehouse is which of the following ?

(A) Can be updated by the end users

(B) Contains numerous naming conventions and formats

(C) Organized around important subject areas

(D) Contains only current data

(E) None of these

3. ______________ servers store and manages files for network users.

(A) Authentication

(B) Main

(C) Web

(D) File

(E) None of these

4. All of the following are examples of real security and privacy risks Except _____

(A) hackers

(B) spam

(C) viruses
(D) identify theft

(E) None of these

5. ___________ terminals (formerly known as cash registers) are often connected to complex

inventory and sales computer systems .

(A) Data

(B) Sales

(C) Query

(D) (Point-of-sale (POS)

(E) None of these

6. The OSI model is divided into _______ processes called layers.

(A) five

(B) six

(C) seven

(D) eight

(E) None of these

7. System software is the set of programs that enables your computer’s hardware devices and

______ software to work together.

(A) management

(B) processing

(C) utility

(D) application

(E) None of these

8. ________ are specially designed computer chips reside inside other devices, such as your car or

your electronic thermostat.

(A) Servers

(B) Embedded computers

(C) Robotic computers

(D) Mainframes

(E) None of these

9. The following are all computing devices , except………

(A) notebook computers

(B) cellular telephones


(C) digital scanners

(D) personal digital assistants

(E) None of these

10. in a ring topology , the the computer in possession of the ______ can trasmit data

(A) packet

(B) data

(C) access method

(D) token

(E) None of these

11. This part of operating system manages the essential peripherals, such as the keyboard, screen ,

disk drives, and parallel and serial ports ____

(A) basic input/output system

(B) secondary input/output system

(C) peripheral input/output system

(D) marginal input/output system

(E) None of these

12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive

(A) Trojan horse

(B) Boot sector

(C) Script

(D) Logic bomb

(E) None of these

13. ________ controls the way in which the computer system functions and provides a means by

which users can interact with the computer

(A) The platform

(B) Application software

(C) Operating system

(D) The motherboard

(E) None of these

14. Servers are computers that provide resources to other computers connected to a ___________

(A) mainframe

(B) network
(C) supercomputer

(D) client

(E) None of these

15. A goal of data mining includes which of the following?

(A) To explain some observed event or condition

(B) To confirm that data exists

(C) To analyze data for expected relationships

(D) To create a new data warehouse

(E) None of these

16. URL stands for ……..

(A) Universal Research List

(B) Universal Resource List

(C) Uniform Resource Locator

(D) Uniform Research Locator

(E) None of these

17. A database management system (DBMS) is a …………

(A) hardware system used to create , maintain and provide controlled access to a database

(B) hardware system used to create, maintain, and provide uncontrolled access to a database.

(C) software system used to create, maintain, and provide uncontrolled access to a database.

(D) software system used to create, maintain, and provide controlled access to a

database.

(E) None of these

19. A Proxy server is used for which of the following?

(A) To provide security against unauthorized users

(B) To process client requests for web pages

(C) To process client requests for database access

(D) To provide TCP/IP

(E) None of these

20. When data changes in multiple lists and all lists are not updated, this causes:

(A) data redundancy

(B) information overload

(C) duplicate data


(D) data inconsistency

(E) None of these

21. _____________ are words that a programming language has set aside for its own use.

(A) Control worlds

(B) Reserved words

(C) Control structures

(D) Reserved keys

(E) None of these

23. ______ describe what is database fields.

(A) Structures

(B) Field markers

(C) Field definition

(D) Field names

(E) None of these

24. You must install a (n) ____________ on a network if you want to share a broadband Internet

connection.

(A) router

(B) modem

(C) node

(D) cable

(E) None of these

25. A goal of normalization is to __________

(A) minimize the number of relationships

(B) minimize the number of entities

(C) minimize the number of tables

(D) minimize the number of redundancy

(E) None of these

26. Granting an outside organization access to internet web pages is often implemented using a (n)

____

(A) extranet

(B) intranet

(C) internet
(D) hacker

(E) None of these

27. Which term identifies a specific computer on the web and the main page of the entire site

(A) URL

(B) Web site address

(C) Hyperlink

(D) Domain name

(E) None of these

28. The code that relational database management systems use to perform their database task is

referred to as …..

(A) QBE

(B) SQL

(C) OLAP

(D) Sequel Server

(E) None of these

29. Chip is a common nickname for a (n):

(A) transistor

(B) resistor

(C) integrated circuit

(D) semiconductor

(E) None of these

30. The purpose of the primary key in a database is to:

(A) unlock the database

(B) provide a map of the data

(C) uniquely identify a record

(D) establish constraints on database operations.

(E) None of these

31. The design of the network is called the network:

(A) architecture

(B) server

(C) transmission
(D) type

(E) None of these

32. The most frequently used instructions of a computer program are likely to be fetched from:

(A) the hard disk

(B) cache memory

(C) RAM

(D) registers

(E) None of these

33. The ____________ contains data descriptions and defines the name, data type, and length of

each field in the database.

(A) data dictionary

(B) data table

(C) data record

(D) data field

(E) None of these

34. Personal logs or journal entries posted on the Web are known as:

(A) listservs

(B) Webcasts

(C) blogs

(D) subject directories

(E) None of these

35. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send

commands to the computer system.

(A) command – based user interface

(B) GUI

(C) system utility

(D) API

(E) None of these

36. Which of the following is NOT a type of broadband Internet connection?

(A) Cable

(B) DSL

(C) Dial-up
(D) Satellite

(E) None of these

37. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:

(A) spyware

(B) adware

(C) spam

(D) malware

(E) None of these

38. Making a field ______ means that it cannot be left blank.

(A) numeric

(B) required

(C) calculated

(D) validated

(E) None of these

39. ____________ are viruses that are triggered by the passage of time or on a certain date.

(A) Boot-sector viruses

(B) Macro viruses

(C) Time bombs

(D) Worms

(E) None of these

40. Linux is a (n) ____________ operating system.

(A) open-source

(B) Microsoft

(C) Windows

(D) Mac

(E) None of these

41. What is a backup?

(A) Restoring the information backup

(B) An exact copy of a system’s information

(C) The ability to get a system up and running in the event of a system crash or failure

(D) All of these

(E) None of these


42. Which of the following places the common data elements in order from smallest to largest

(A) character, file, record, field, database

(B) character, record, field, database, file

(C) character, field, record, file, database

(D) Bit, byte, character, record, field, file, database,

(E) None of these

43. The internet is ……

(A) a large network of networks

(B) an internal communication system for a business

(C) a communication system for the Indian government

(D) All of these

(E) None of these

44. ____________ are lists of commands that appear on the screen.

(A) GUIs

(B) Icons

(C) Menus

(D) Windows

(E) None of these

45. Which of the following statements is FALSE concerning file names?

(A) Files may share the same name or the same extension but not both

(B) Every file in the same folder must have a unique name

(C) File extension is another name for file type

(D) The file extension comes before the dot (.) followed by the file name

(E) None of these

46. Verification of a login name and password is known as:

(A) configuration

(B) accessibility

(C) authentication

(D) logging in

(E) None of these

47. Which of the following would most likely NOT be a symptom of a virus?

(A) Existing program files and icons disappear.


(B) The CD-ROM stops functioning.

(C) The Web browser opens to an unusual home page.

(D) Odd messages or images are displayed on the screen.

(E) None of these

computer awarness for clerical

1.Which among the following is not a security / privacy risk?

(A)Spam

(B)Hacking

(C)Virus

(D)Phishing

(E)Vishing

Ans. Spam

2.Now a days Vishing has become a criminal practice of using social engineering over which of the

following?

(A)Social networking sites

(B)Mobile Phones

(C)E-mails

(D)Cyber cafés

(E)All of the above

Ans. Mobile Phones

3.When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way

asking for sensitive banks and online payment information, this is a case of __?

(A)spam

(B)hacking

(C)Phishing

(D)Vishing

(E)Simulation

Ans. Phishing

4.Which among the following is a correct definition of “Digital Divide”?

(A) gap between people having access to mobile and internet access

(B) gap between people having access to internet /IT and no internet/IT
(C) gap between people having access to broadband and narrowband internet

(D) gap between people having access to internet banking and normal banking

(E)Gap between the people having an email account and no email account

Ans. (B) gap between people having access to internet /IT and no internet/IT

5.Which among the following is the most common source of Viruses to the hard disk of your

computer?

(A)Incoming Email

(B)Outgoing Email

(C)CD Roms

(D)Websites

(E)Mobile

Ans. (A) Incoming Email

6.What is the fullform of W3C?

(A)World Wide Web Consortium

(B)World Wide Web Company

(C)World Wide Web Center

(D)World Wide Web Command

(E)None of them

Ans. (A) World Wide Web Consortium

7.Which among the following is used for removing a software bug / defect which is available for free

of cost from the software provider?

(A)Version

(B)Update

(C)Help

(D)Patch

(E)Syntax

Ans. (D) Patch

8.What is the name of the proposed software application that would allow users of automated teller

machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal
identification number (PIN) in reverse order?

(A)ATM SafetyPIN

(B)ATM SafetyPro

(C)ATM SafetyCode

(D)ATM SafetySign

(E)ATM SafetyDigit

Ans. (A) ATM SafetyPIN

9.In the MICR Code Line Structure what do represent the first three digits of Sort field number

consisting of nine digits?

(A)City

(B)Bank

(C)Branch

(D)Account Type

(E)None of the above

Ans. first three digits represent the city, the next three indicate the bank and the last three digits

signify the branch

10.Most of the internet banking sites provide which of the following feature to reduce the risk of

keystroke logging for the password entry?

(A)Virtual keyboard

(B)Finger Touching

(C)Touchscreen

(D)ShapeWriter

(E)Dasher

Ans. (A) Virtual Keyboard

11.ADSL data communications technology uses which of the following for faster data transmission ?

(A)Voiceband modem

(B)Wireless Modem

(C)Copper telephone Lines

(D)Sockets

(E)None of the above


Ans. (C) Copper telephone Lines

12.While working on Microsoft World , which among the following is the command for “Undo”?

(A)Cntrl +A

(B)Cntrl +Z

(C)Cntrl +Y

(D)Cntrl +C

(E)Cntrl +V

Ans. (B) Cntrl + Z

13.While browsing the internet , which of the following key is used for full screen view?

(A)F3

(B)F5

(C)F11

(D)F9

(E)F10

Ans. (C) F11

14.Which of the following is a suitable term for any programmable content of a hardware device

configurations and data for application-specific integrated circuits (ASICs), programmable logic

devices, etc.?

(A)Hardware

(B)Software

(C)Firmware

(D)Malware

(E)Liveware

Ans. (C) Firmware

15.Most of the internet sites now a days use CSS primarily to enable the separation of document

content (written in HTML or a similar markup language) from document presentation, including

elements such as the layout, colors, and fonts. What is full form?

(A)Cascading Style Software

(B)Clear Style Sheet

(C)Cascading Style Sheet


(D)Common Style Sheet

(E)Conditional Style Sheet

Ans. (C) Cascading Style Sheet

16.What is the purpose of keeping electronic devices such as computers, televisions, and remote

controlled devices on Sleep mode?

(A)Reduce Power consumption

(B)Back Up

(C)To write contents of RAM to hard disc

(D)To improve download speed

(E)None of the above

Ans. (A) Deduce Power Consumption

17.Which of the following device is a volatile storage?

(A)RAM

(B)Hard Disc

(C)Magnetic Tape

(D)Floppy Disc

(E)ROM

Ans. (A) RAM

18.Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC?

(A)IBM

(B)Microsoft

(C)Intel

(D)Google

(E)Apple

Ans. (B) Microsoft

19.What is Office Open XML?

(A)A file format

(B)A software

(C)A electronic device


(D)An international standard

(E)None of the above

Ans. (A) A file format

20.What is the ultimate purpose of Defragmentation?

(A)Make the PC faster

(B)Create More Free Space

(C)Delete temporary files

(D)Reduce Power consumption

(E)All of the above

Ans. (B) Create More Free Space is the main purpose however performance is also improved in

most case

You might also like