Professional Documents
Culture Documents
In a survey of more than 500 companies and government agencies, ____________ percent
detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C
2. The survey showed that these businesses lost more than ____________ due to security
breaches.
A. $100,000 each
B. $377 million
D. $1 million
Answer: B
A. young hacker.
Answer: B
A. hackers.
B. insiders.
C. overseas criminals.
Answer: B
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
6. Collecting personal information and effectively posing as another individual is known as the crime
of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to disk is
known as a:
A. Trojan horse.
B. virus.
C. time bomb.
Answer: B
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
15. What is the name of an application program that gathers user information and sends it to
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the spread
of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
A. your computer.
D. No
Answer: B
18. Software programs that close potential security breaches in an operating system are known as:
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is
known as:
A. a virus.
B. a Trojan horse.
C. cracking.
Answer: D
20. ___________ is the measurement of things such as fingerprints and retinal scans used for
security access.
A. Biometrics
B. Biomeasurement
C. Computer security
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer network is
known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
Answer: B
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A
A. cryptology source.
B. encryption key.
D. cryptosystem.
26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
27. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
Answer: B
A. encryption
B. firewall software
C. PGP
Answer: C
30. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
A. logins
B. passwords
C. encryption
Answer: B
32. Creating strong computer security to prevent computer crime usually simultaneously helps
protect :
A. privacy rights.
B. personal ethics.
D. personal space.
Answer: A
33. Over ___________ was spent by businesses and government to repair problems in regard to
Y2K.
A. 20 million dollars
C. 1 billion dollars
Answer: D
34. What is a complex system that takes on nearly complete responsibility for a task eliminating the
A. Autonomous system
C. Smart weapon
D. Independent system
Answer: D
Answer: B
36. The field of computer ____________ uses special software to scan hard drives of potential
criminal suspects.
Answer: crime
38. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet
Answer: Theft
40. A survey by eMarketer.com found that ____________ are the most often cited online fraud
cases.
41. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook
42. When you use a disk in several different computers within the same day, you are taking the
43. A(n) ____________ attaches itself to documents that contain embedded programs that
automate tasks.
Answer: worms
Answer: Antivirus
46. A security patch is a software program that closes possible security breaches in the operating
47. ____________ was once the word used for malicious computer wizardry.
Answer: Cracking
49. DoS stands for ___________.
51. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers
Answer: Audit-control
53. Each individual who uses a public key cryptosystem has ___________ keys.
55. Most operating systems, including Windows XP, assign each user a unique ___________.
56. It should now be common knowledge that users should not open ___________ from e-mail
Answer: attachments
Matching:
I. Computer Fraud and Abuse Act A. created by Attorney General Janet Reno in 1998
II. USA Patriot Act B. defines what kinds of communications are legal online
III. Digital Millennium Copyright Act C. created in 2001 as a response to the terrorist attacks of
IV. Telecommunications Act of 1996 D. provides instant information on crimes and criminals
VI. National Infrastructure Protection Center F. created as a result of the first headline-making
worm
VII. National Crime Information Center G. used to arrest a student for writing to crack an Adobe
product
Answers: F, C, G, B, E, A, D
58. Match the following rules of thumb about safe computing with the proper descriptions:
I. share with care A. be aware of e-mail from what appear to be legitimate companies
Answers: C, A, F, B, D, E
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag
and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a database all
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
A. proprietary.
B. open.
C. experimental.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100
nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of
A. Nanoscience
B. Nanotechnology
C. Simulation
Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the actual
A. data.
B. output.
C. input.
D. the process.
Answer: B
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet, each number and each special character is
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
A. scanner
B. speaker
C. CD
D. printer
Answer: A
B. printers.
D. CD drives.
Answer: B
28. The ____________, also called the “brains†of the computer, is responsible for processing
data.
A. motherboard
B. memory
C. RAM
Answer: D
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
A. application software.
B. system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables your computer’s hardware devices and
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different
operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
37. ____________ are specially designed computers that perform complex calculations extremely
rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
A. network
B. wireless
C. slow
D. broadband
Answer: D
39. The difference between people with access to computers and the Internet and those without this
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
40. ____________ is the science revolving around the use of nanostructures to build devices on an
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
41. Which of the following is the correct order of the four major functions of a computer?
Answer: D
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
A. 8
B. 2
C. 1,000
D. 1
Answer: B
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
45. ____________ controls the way in which the computer system functions and provides a means
A. The platform
C. Application software
D. The motherboard
Answer: B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
47. ____________ are specially designed computer chips that reside inside other devices, such as
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
48. The steps and tasks needed to process data, such as responses to questions or clicking an icon,
are called:
A. instructions.
C. application software.
Answer: A
Answer: D
50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
51. Between PCs and Macs, the ____________ is the platform of choice for graphic
Answer: Mac
52. The ____________ is the program that manages the hardware of the computer
system, including the CPU, memory, storage devices, and input/output devices.
53. The type of operating system software you use depends on your computer’s
____________.
Answer: platform
54. ____________software helps you carry out tasks, such as typing a document or
creating a spreadsheet.
Answer: Application
Answer: Supercomputers
Answer: kilobyte
57. Input devices are used to provide the steps and tasks the computer needs to process
Answer: instructions
58. A computer gathers data, processes it, outputs the data or information, and
Answer: stores
59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
61. The devices you use to enter data into a computer system are known as
____________ devices.
Answer: input
62. The devices on a computer system that let you see the processed information are
Answer: output
63. ____________ is the set of computer instructions or programs that enables the
Answer: Software
64. When you connect to the ____________, your computer is communicating with a
Answer: Internet
65. ____________ are computers that excel at executing many different computer
Answer: Mainframes
66. ____________is the application of computer systems and techniques to gather legal
evidence.
67. ____________ is the science that attempts to create machines that will emulate the
69. A process known as ____________ tracks trends and allows retailers to respond to
70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage
71. You would use ____________ software to create spreadsheets, type documents, and
edit photos.
Answer: application
simultaneously.
Answer: Mainframes
73. ____________ is the term given to the act of stealing someone’s identity and
74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers
75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat
Answer: simulators
Answer: True
Answer: True
Answer: True
79. The discrepancy between the “haves†and “have-nots†with regard to
80. One of the benefits of becoming computer fluent is being a savvy computer user and
consumer and knowing how to avoid viruses, the programs that posethreats to computer
security.
Answer: True
81. Trend-spotting programs, developed for business, have been used to predict criminal
activity.
Answer: True
82. Employers do not have the right to monitor e-mail and network traffic on employee
Answer: False
83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True
84. Output devices store instructions or data that the CPU processes.
85. The CPU and memory are located on a special circuit board in the system unit called
the motherboard.
Answer: True
86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True
mainframes are designed to handle many programs running at the same time (but at a
slower pace).
Answer: True
88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False
89. Embedded computers are self-contained computer devices that have their own
Answer: True
90. A Web browser is a special device that is installed in your computer that allows it to
Answer: True
92. The most common type of memory that the computer uses to process data is ROM.
Matching:
Answer: C, B, D, A, E
V. CD drive E. processor
Answer: B, C, D, E, A
I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of
users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such
as temperature control
Answer: C, A, D, E, B
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the
Answer: D, C, E, A, B
I. system software A. the set of programs that enables computer hardware devices and application
II. application software B. the kind of operating system software you will use depends on this
Answer: A, D, B, C, E
Answer: B, D, C, E, A
I. bit A. the science revolving around the use of nanostructures to build devices on an extremely
small scale
II. binary language B. the case that contains the system components
Answer: D, C, E, B, A
Answer: C, B, D, A, E
1. Programs from the same developer , sold bundled together , that provide better integration and
(A) Authentication
(B) Main
(C) Web
(D) File
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
5. ___________ terminals (formerly known as cash registers) are often connected to complex
(A) Data
(B) Sales
(C) Query
(A) five
(B) six
(C) seven
(D) eight
7. System software is the set of programs that enables your computer’s hardware devices and
(A) management
(B) processing
(C) utility
(D) application
8. ________ are specially designed computer chips reside inside other devices, such as your car or
(A) Servers
(D) Mainframes
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(D) token
11. This part of operating system manages the essential peripherals, such as the keyboard, screen ,
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(C) Script
13. ________ controls the way in which the computer system functions and provides a means by
14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a
database.
20. When data changes in multiple lists and all lists are not updated, this causes:
21. _____________ are words that a programming language has set aside for its own use.
(A) Structures
24. You must install a (n) ____________ on a network if you want to share a broadband Internet
connection.
(A) router
(B) modem
(C) node
(D) cable
26. Granting an outside organization access to internet web pages is often implemented using a (n)
____
(A) extranet
(B) intranet
(C) internet
(D) hacker
27. Which term identifies a specific computer on the web and the main page of the entire site
(A) URL
(C) Hyperlink
28. The code that relational database management systems use to perform their database task is
referred to as …..
(A) QBE
(B) SQL
(C) OLAP
(A) transistor
(B) resistor
(D) semiconductor
(A) architecture
(B) server
(C) transmission
(D) type
32. The most frequently used instructions of a computer program are likely to be fetched from:
(C) RAM
(D) registers
33. The ____________ contains data descriptions and defines the name, data type, and length of
34. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
35. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send
(B) GUI
(D) API
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
37. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(A) numeric
(B) required
(C) calculated
(D) validated
39. ____________ are viruses that are triggered by the passage of time or on a certain date.
(D) Worms
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(C) The ability to get a system up and running in the event of a system crash or failure
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(D) The file extension comes before the dot (.) followed by the file name
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
47. Which of the following would most likely NOT be a symptom of a virus?
(A)Spam
(B)Hacking
(C)Virus
(D)Phishing
(E)Vishing
Ans. Spam
2.Now a days Vishing has become a criminal practice of using social engineering over which of the
following?
(B)Mobile Phones
(C)E-mails
(D)Cyber cafés
3.When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way
asking for sensitive banks and online payment information, this is a case of __?
(A)spam
(B)hacking
(C)Phishing
(D)Vishing
(E)Simulation
Ans. Phishing
(A) gap between people having access to mobile and internet access
(B) gap between people having access to internet /IT and no internet/IT
(C) gap between people having access to broadband and narrowband internet
(D) gap between people having access to internet banking and normal banking
(E)Gap between the people having an email account and no email account
Ans. (B) gap between people having access to internet /IT and no internet/IT
5.Which among the following is the most common source of Viruses to the hard disk of your
computer?
(A)Incoming Email
(B)Outgoing Email
(C)CD Roms
(D)Websites
(E)Mobile
(E)None of them
7.Which among the following is used for removing a software bug / defect which is available for free
(A)Version
(B)Update
(C)Help
(D)Patch
(E)Syntax
8.What is the name of the proposed software application that would allow users of automated teller
machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal
identification number (PIN) in reverse order?
(A)ATM SafetyPIN
(B)ATM SafetyPro
(C)ATM SafetyCode
(D)ATM SafetySign
(E)ATM SafetyDigit
9.In the MICR Code Line Structure what do represent the first three digits of Sort field number
(A)City
(B)Bank
(C)Branch
(D)Account Type
Ans. first three digits represent the city, the next three indicate the bank and the last three digits
10.Most of the internet banking sites provide which of the following feature to reduce the risk of
(A)Virtual keyboard
(B)Finger Touching
(C)Touchscreen
(D)ShapeWriter
(E)Dasher
11.ADSL data communications technology uses which of the following for faster data transmission ?
(A)Voiceband modem
(B)Wireless Modem
(D)Sockets
12.While working on Microsoft World , which among the following is the command for “Undo”?
(A)Cntrl +A
(B)Cntrl +Z
(C)Cntrl +Y
(D)Cntrl +C
(E)Cntrl +V
13.While browsing the internet , which of the following key is used for full screen view?
(A)F3
(B)F5
(C)F11
(D)F9
(E)F10
14.Which of the following is a suitable term for any programmable content of a hardware device
configurations and data for application-specific integrated circuits (ASICs), programmable logic
devices, etc.?
(A)Hardware
(B)Software
(C)Firmware
(D)Malware
(E)Liveware
15.Most of the internet sites now a days use CSS primarily to enable the separation of document
content (written in HTML or a similar markup language) from document presentation, including
elements such as the layout, colors, and fonts. What is full form?
16.What is the purpose of keeping electronic devices such as computers, televisions, and remote
(B)Back Up
(A)RAM
(B)Hard Disc
(C)Magnetic Tape
(D)Floppy Disc
(E)ROM
18.Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC?
(A)IBM
(B)Microsoft
(C)Intel
(D)Google
(E)Apple
(B)A software
Ans. (B) Create More Free Space is the main purpose however performance is also improved in
most case