Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than...
Transcript of Questions and answers on Computer Awareness€¦ · Computer Awareness 1. In a survey of more than...
1
2
Questions and answers on
Computer Awareness
1. In a survey of more than 500 companies and
government agencies, ____________ percent detected
computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C
2. The survey showed that these businesses lost more
than ____________ due to security breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B
3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal
record.
D. overseas young cracker.
Answer: B
3
4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B
5. The common name for the crime of stealing
passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer
6. Collecting personal information and effectively posing
as another individual is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B
8. A program that performs a useful task while
simultaneously allowing destructive acts is a:
4
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from
program to program or from disk to disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B
10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce
itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is
a lack of:
A. memory or disk space.
5
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
13. When a logic bomb is activated by a time-related
event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on
Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
15. What is the name of an application program that
gathers user information and sends it to someone through
the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the
Windows operating system has made the spread of
6
viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
Answer: B
18. Software programs that close potential security
breaches in an operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
19. When customers of a Web site are unable to access it
due to a bombardment of fake traffic, it is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D
20. ___________ is the measurement of things such as
fingerprints and retinal scans used for security access.
7
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A
21. What is the most common tool used to restrict access
to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain
include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against
unauthorized access to a computer network is known as
a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B
8
24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A
25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D Reference: How It Works: 10.2
Cryptography
26. To prevent the loss of data during power failures, use
a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
27. A(n) ____________ can shield electronic equipment
from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
9
28. All of these are suggestions for safe computing
EXCEPT:
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B
29. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C
30. ____________ is defined as any crime completed
through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
31. Most computer systems rely solely on ___________
for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B
10
32. Creating strong computer security to prevent
computer crime usually simultaneously helps protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal
computer.
D. personal space.
Answer: A
33. Over ___________ was spent by businesses and
government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D
34. What is a complex system that takes on nearly
complete responsibility for a task eliminating the need
for people, verification, or decision making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D
35. Security procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B
11
Fill in the Blank:
36. The field of computer ____________ uses special
software to scan hard drives of potential criminal
suspects.
Answer: forensics Reference: Online Outlaws:
Computer Crime Difficulty: Challenging
37. Computer ____________ often goes unreported
because businesses fear negative publicity.
Answer: crime
38. ____________ connections are the most frequent
point of attack for Internet commerce.
Answer: Internet
39. ____________ is the most common form of
computer crime.
Answer: Theft
40. A survey by eMarketer.com found that
____________ are the most often cited online fraud
cases.
Answer: online auctions Reference: Identity Theft
41. Theft of computers is most common for PDAs and
____________ computers.
Answer: notebook
42. When you use a disk in several different computers
within the same day, you are taking the chance of
contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy
12
43. A(n) ____________ attaches itself to documents that
contain embedded programs that automate tasks.
Answer: macro virus
44. Both viruses and ____________ use computer hosts
to replicate.
Answer: worms
45. ____________ programs search for and eliminate
viruses.
Answer: Antivirus
46. A security patch is a software program that closes
possible security breaches in the operating system. The
cost to the consumer is ____________.
Answer: nothing or free
47. ____________ was once the word used for malicious
computer wizardry.
Answer: Hackers or hacking
48. ____________ refers to electronic trespassing or
criminal hacking.
Answer: Cracking
49. DoS stands for ___________.
Answer: denial of service
50. DDoS stands for ___________.
Answer: distributed denial of service
13
51. ____________ hijack Web pages and redirect users
to other sites.
Answer: Webjackers
52. ___________ software monitors and records
computer transactions.
Answer: Audit-control
53. Each individual who uses a public key cryptosystem
has ___________ keys.
Answer: two Reference: How It Works: 10.2
Cryptography
54. PGP stands for ___________.
Answer: Pretty Good Privacy
55. Most operating systems, including Windows XP,
assign each user a unique ___________.
Answer: user identifier or user ID
56. It should now be common knowledge that users
should not open ___________ from e-mail recipients
that the user does not know.
Answer: attachments
Matching:
57. Match the acts and centers with their purposes:
I. Computer Fraud and Abuse Act A. created by
Attorney General Janet Reno in 1998
II. USA Patriot Act B. defines what kinds of
communications are legal online
14
III. Digital Millennium Copyright Act C. created in 2001
as a response to the terrorist attacks of September 11,
2001
IV. Telecommunications Act of 1996 D. provides instant
information on crimes and criminals
V. Communications Decency Act E. declared
unconstitutional by the Supreme Court
VI. National Infrastructure Protection Center F. created
as a result of the first headline-making worm
VII. National Crime Information Center G. used to arrest
a student for writing to crack an Adobe product
Answers: F, C, G, B, E, A, D
58. Match the following rules of thumb about safe
computing with the proper descriptions:
I. share with care A. be aware of e-mail from what
appear to be legitimate companies
II. handle e-mail carefully B. don’t choose a dictionary
word
III. disinfect regularly C. keep your disks in your own
computer
IV. take your password seriously D. copy, copy, copy
V. if it’s important, back it up E. encrypt
VI. sensitive info over the Internet? F. use antivirus
software
Answers: C, A, F, B, D, E
Section two
1. Lotus Organizer and Corel Central are examples of
____________ software.
A. analytical
15
B. database
C. presentation
D. PIM
Answer: D
2. For which of the following tasks would PIM software
be most useful?
A. Drafting a memo
B. Maintaining a schedule
C. Calculating a budget
D. Keeping track of recipes
Answer: B
3. The smallest unit of information in a database is called
a:
A. byte.
B. record.
C. field.
D. cell.
Answer: C
4. In a database of employees, all the information about a
particular person would constitute a:
A. file.
B. record.
C. field.
D. table.
Answer: B
5. A table is a collection of:
A. files.
B. worksheets.
16
C. fields.
D. records.
Answer: D
6. A ____________ is a small program that helps to
automate a frequently used series of commands in most
productivity software tools.
A. template
B. macro
C. utility
D. wizard
Answer: B
7. If you are using a template in a productivity software
application, you are most likely trying to:
A. assign a basic theme or structure to the file with
which you are working.
B. perform a series of steps in a time-efficient manner.
C. gain assistance in performing complicated tasks.
D. combine different documents together to form a
single integrated whole.
Answer: A
8. Software providers who develop many productivity
tools may also provide stripped-down versions that
combine the simpler features of these tools bundled
together into a(n):
A. software suite.
B. personal information manager.
C. integrated software application.
D. limited software edition.
Answer: C
17
9. Microsoft Office is an example of a(n):
A. software suite.
B. open-source product.
C. integrated software application.
D. business-management application.
Answer: A
10. When talking to a speech recognition program, the
program divides each second of your speech into 100
separate:
A. phonemes.
B. codes.
C. samples.
D. words.
Answer: C
11. A speech recognition system’s codebook values are
matched against a database of ____________ as an early
step in word construction.
A. phonemes
B. codes
C. samples
D. words
Answer: A
12. Quicken and TurboTax are both personal financial
products developed by:
A. Microsoft.
B. Corel.
C. Intuit.
D. Adobe.
Answer: C
18
13. Individuals who want software to assist in automated
checkbook balancing and bill paying for their personal
bank and credit card accounts will likely use which of
the following software products?
A. Microsoft Project
B. QuickBooks
C. Acrobat
D. Quicken
Answer: D
14. Small business owners who want software to assist in
managing accounts payable and receivable will likely
use which of the following software products?
A. QuickBooks
B. Business Plan Pro
C. Quicken
D. Microsoft Project
Answer: A
15. If you want software to assist in estimating the time
it takes for a sequence of tasks to be accomplished and to
track the progress of people working on these tasks,
which of the following software products would you
use?
A. Microsoft Project
B. Front Page
C. Business Plan Pro
D. Visio
Answer: A
16. Which of the following software products is most
appropriate for plotting out your company’s corporate
19
strategy?
A. Microsoft Project
B. Front Page
C. Business Plan Pro
D. Visio
Answer: C
17. The category of software most appropriate for
controlling the design and layout of complex documents
like newsletters and brochures is:
A. word processing.
B. computer-aided design.
C. Web page authoring.
D. desktop publishing.
Answer: D
18. Which of the following software products would you
use in order to enhance the quality of a photograph that
you have recently imported from your digital camera,
and would likely have been included with the digital
camera when you bought it?
A. ArcSoft
B. Visio
C. Dreamweaver
D. TurboCad
Answer: A
19. Drawing flow charts, block diagrams, and other
technical graphics is best accomplished using which of
the following software products?
A. Jasc Paint Shop Pro
B. Microsoft Visio
20
C. Macromedia Dreamweaver
D. Adobe Illustrator
Answer: B
20. CAD software is most likely to be used by:
A. Web designers.
B. engineers.
C. project managers.
D. magazine editors.
Answer: B
21. All of the following are tasks performed by the
operating system EXCEPT:
A. managing hardware on the computer.
B. controlling the access that application programs have
to the CPU.
C. performing housekeeping tasks like file compression
and disk defragmentation.
D. providing an interface for users to interact with the
computer.
Answer: C
22. The category of operating system that you most
likely have running on your desktop or laptop computer
at home is a ____________ operating system.
A. real-time
B. single-user, single-task
C. single-user, multi-task
D. multi-user, multi-task
Answer: C
21
23. The category of operating system that you most
likely have running on your PDA computer is a
____________ operating system.
A. real-time
B. single-user, single-task
C. single-user, multi-task
D. multi-user, multi-task
Answer: B
24. Which of the following is an example of a real-time
operating system?
A. Lynx
B. MS DOS
C. Windows XP
D. Symbian
Answer: A
25. A real-time operating system is most likely to be
used for which of the following tasks?
A. Controlling access to a shared printer in a network
B. Ensuring that the system clock works correctly on a
server
C. Managing the access to system files in a laptop
computer
D. Controlling the fuel injection system of an automobile
engine
Answer: D
26. An essential difference between the operating system
that runs a typical desktop computer and the operating
system that runs a typical PDA is that:
A. the desktop OS has a graphical user interface whereas
22
the PDA OS does not.
B. the desktop OS can run several programs
simultaneously whereas the PDA OS cannot.
C. the desktop OS manages hardware resources whereas
the PDA OS does not.
D. the desktop computer has an OS whereas a PDA does
not.
Answer: B
27. The MS-DOS operating system is a:
A. graphical user interface, single-tasking operating
system.
B. graphical user interface, multi-tasking operating
system.
C. command-driven interface, single-tasking operating
system.
D. command-driven interface, multi-tasking operating
system.
Answer: C
28. Which of the following was an early desktop
operating system that included an integrated graphic user
interface with point-and-click features?
A. MS-DOS
B. Mac OS
C. Unix
D. Gnome
Answer: B
23
29. The most recent version of the Mac OS is based on
the ____________ operating system.
A. Windows
B. Linux
C. Unix
D. CMOS
Answer: C
30. The ____________ operating system was initially
created in the early 1970s at AT&T’s Bell Labs.
A. Linux
B. DOS
C. Unix
D. GNU
Answer: C
31. The essential difference between an operating system
like Linux and one like Windows is that:
A. Windows can run with an Intel processor, whereas
Linux cannot.
B. Linux is proprietary, whereas Windows is not.
C. any programmer can modify Linux code, which is not
permitted with Windows.
D. there are multiple versions of Linux, but only one
version of Windows.
Answer: C
32. Which of the following is a correct association
between a vendor and an operating system?
A. Redhat ? Linux
B. AT&T ? MS DOS
C. Microsoft ? Unix
24
D. Novell ? Linux
Answer: A
33. Which of the following is NOT an advantage of
open-source operating systems over proprietary
versions?
A. Free use and distribution
B. Availability of technical support
C. Availability of source code
D. Ability to modify code
Answer: B
34. Use of icons and windows are characteristic of a
____________ interface.
A. command-driven
B. windows-oriented
C. graphical-user
D. menu-driven
Answer: C
35. The ability of an operating system to control the
activities of multiple programs at the same time is called:
A. multitasking.
B. multi-processing.
C. multi-operating.
D. multi-paging.
Answer: A
36. The operating system controls access to the CPU by
assigning a(n) ____________ to each task requiring
CPU utilization.
A. interrupt handler
25
B. slices of time
C. stack
D. event
Answer: B
37. When a peripheral device needs immediate attention
from the operating system, it generates a(n):
A. interrupt.
B. spool.
C. stack.
D. page file.
Answer: A
38. User actions such as keystrokes or mouse clicks are
referred to as:
A. interrupts.
B. tasks.
C. events.
D. processes.
Answer: C
39. An interrupt handler is a:
A. location in memory that keeps track of recently
generated interrupts.
B. hardware device that manages the interrupts generated
by peripheral units.
C. utility program that communicates interrupts to the
operating system.
D. special numeric code that indicates the priority of an
interrupt.
Answer: D
26
40. A spooler is a:
A. location in memory that maintains the contents of a
document until it prints out.
B. queue of print jobs that are waiting to print.
C. program that coordinates the print jobs that are
waiting to process.
D. message sent from the printer to the operating system
when a print job is completed.
Answer: C
41. Virtual memory is typically located:
A. in RAM.
B. in the CPU.
C. in a flash card.
D. on the hard disk.
Answer: D
42. The purpose of a swap (or page) file is to:
A. maintain pages of documents that are being spooled
to the printer.
B. hold a program’s data or instructions in virtual
memory when it can’t fit in RAM.
C. prevent thrashing in a multi-tasking environment.
D. allow multiple print jobs to print their pages out
simultaneously.
Answer: B
43. Thrashing is caused by:
A. over-reliance on swapping to virtual memory.
B. insufficient hard disk space.
C. too many processors being managed by the operating
system.
27
D. inaccurate information stored in the registry.
Answer: A
44. Communication between the operating system and a
peripheral device such as a CD-ROM drive or a printer is
facilitated by a(n):
A. spooler.
B. network card.
C. device driver.
D. application program interface.
Answer: C
45. Common functions and routines that need to be
executed by many computer programs can be made
available via a(n) ____________, which prevents the
necessity for programmers to duplicate the effort of
writing the same type of code.
A. utility program
B. system kernel
C. BIOS directory
D. application program interface
Answer: D
46. Which of the following is the correct sequence of
actions that take place during the boot-up process?
A. Load operating system ? Activate BIOS ? Perform
POST ? Check configuration settings
B. Activate BIOS ? Perform POST ? Load operating
system ? Check configuration settings
C. Perform POST ? Load operating system ? Activate
28
BIOS ? Check configuration settings
D. Activate BIOS ? Check configuration settings ?
Perform POST ? Load operating system
Answer: B
47. The program that is responsible for loading the
operating system into RAM is the:
A. BIOS.
B. bootstrap program.
C. device driver.
D. supervisor program.
Answer: A
48. The Basic Input/Output system resides in:
A. RAM.
B. ROM.
C. the CPU.
D. memory cache.
Answer: B
49. When you start up the computer, the boot-up stage at
which the BIOS version, manufacturer, and data are
displayed on the monitor is called:
A. bootstrap.
B. power-on self test.
C. system configuration.
D. kernel loading.
Answer: B
50. Part of the POST process is to ensure that the test of
essential peripheral devices coincides with the hardware
configurations that are stored in:
29
A. ROM.
B. the hard drive.
C. CMOS.
D. cache memory.
Answer: C
30
Computer General Awareness
1. Programs from the same developer , sold bundled
together , that provide better integration and share
common features , toolbars and menus are known as ….
(A) software suites (B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas (D) Contains only current data
(E) None of these
3. ______________ servers store and manages files for
network users.
(A) Authentication
(B) Main
(C) Web
(D) File (E) None of these
4. All of the following are examples of real security and
privacy risks Except _____
(A) hackers
(B) spam
31
(C) viruses
(D) identify theft
(E) None of these
5. ___________ terminals (formerly known as cash
registers) are often connected to complex inventory and
sales computer systems .
(A) Data
(B) Sales (C) Query
(D) (Point-of-sale (POS)
(E) None of these
6. The OSI model is divided into _______ processes
called layers.
(A) five
(B) six
(C) seven (D) eight
(E) None of these
7. System software is the set of programs that enables
your computer’s hardware devices and ______ software
to work together.
(A) management
(B) processing
(C) utility
(D) application (E) None of these
8. ________ are specially designed computer chips
reside inside other devices, such as your car or your
32
electronic thermostat.
(A) Servers
(B) Embedded computers (C) Robotic computers
(D) Mainframes
(E) None of these
9. The following are all computing devices ,
except………
(A) notebook computers
(B) cellular telephones
(C) digital scanners (D) personal digital assistants
(E) None of these
10. in a ring topology , the the computer in possession of
the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token (E) None of these
11. This part of operating system manages the essential
peripherals, such as the keyboard, screen , disk drives,
and parallel and serial ports ____
(A) basic input/output system (B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
33
12. ________ Viruses are often transmitted by a floppy
disk left in the floppy drive
(A) Trojan horse
(B) Boot sector (C) Script
(D) Logic bomb
(E) None of these
13. ________ controls the way in which the computer
system functions and provides a means by which users
can interact with the computer
(A) The platform
(B) Application software
(C) Operating system (D) The motherboard
(E) None of these
14. Servers are computers that provide resources to other
computers connected to a ___________
(A) mainframe
(B) network (C) supercomputer
(D) client
(E) None of these
15. A goal of data mining includes which of the
following?
(A) To explain some observed event or condition (B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
34
16. URL stands for ……..
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator (D) Uniform Research Locator
(E) None of these
17. A database management system (DBMS) is a
…………
(A) hardware system used to create , maintain and
provide controlled access to a database
(B) hardware system used to create, maintain, and
provide uncontrolled access to a database.
(C) software system used to create, maintain, and
provide uncontrolled access to a database.
(D) software system used to create, maintain, and
provide controlled access to a database. (E) None of these
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages (C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
20. When data changes in multiple lists and all lists are
not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
35
(D) data inconsistency (E) None of these
21. _____________ are words that a programming
language has set aside for its own use.
(A) Control worlds
(B) Reserved words (C) Control structures
(D) Reserved keys
(E) None of these
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names (E) None of these
24. You must install a (n) ____________ on a network if
you want to share a broadband Internet connection.
(A) router (B) modem
(C) node
(D) cable
(E) None of these
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy (E) None of these
36
26. Granting an outside organization access to internet
web pages is often implemented using a (n) ____
(A) extranet (B) intranet
(C) internet
(D) hacker
(E) None of these
27. Which term identifies a specific computer on the web
and the main page of the entire site
(A) URL (B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
28. The code that relational database management
systems use to perform their database task is referred to
as …..
(A) QBE
(B) SQL (C) OLAP
(D) Sequel Server
(E) None of these
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit (D) semiconductor
(E) None of these
37
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data (C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
31. The design of the network is called the network:
(A) architecture (B) server
(C) transmission
(D) type
(E) None of these
32. The most frequently used instructions of a computer
program are likely to be fetched from:
(A) the hard disk
(B) cache memory (C) RAM
(D) registers
(E) None of these
33. The ____________ contains data descriptions and
defines the name, data type, and length of each field in
the database.
(A) data dictionary (B) data table
(C) data record
(D) data field
(E) None of these
38
34. Personal logs or journal entries posted on the Web
are known as:
(A) listservs
(B) Webcasts
(C) blogs (D) subject directories
(E) None of these
35. A(n) _______ uses pictures (called icons) and menus
displayed on the screen to send commands to the
computer system.
(A) command – based user interface
(B) GUI (C) system utility
(D) API
(E) None of these
36. Which of the following is NOT a type of broadband
Internet connection?
(A) Cable
(B) DSL
(C) Dial-up (D) Satellite
(E) None of these
37. Software, such as viruses, worms and Trojan horses,
that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware (E) None of these
39
38. Making a field ______ means that it cannot be left
blank.
(A) numeric
(B) required (C) calculated
(D) validated
(E) None of these
39. ____________ are viruses that are triggered by the
passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs (D) Worms
(E) None of these
40. Linux is a (n) ____________ operating system.
(A) open-source (B) Microsoft
(C) Windows
(D) Mac
(E) None of these
41. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system’s information
(C) The ability to get a system up and running in the
event of a system crash or failure
(D) All of these (E) None of these
40
42. Which of the following places the common data
elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database (D) Bit, byte, character, record, field, file, database,
(E) None of these
43. The internet is ……
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these (E) None of these
44. ____________ are lists of commands that appear on
the screen.
(A) GUIs
(B) Icons
(C) Menus (D) Windows
(E) None of these
45. Which of the following statements is FALSE
concerning file names?
(A) Files may share the same name or the same
extension but not both
(B) Every file in the same folder must have a unique
name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.)
41
followed by the file name (E) None of these
46. Verification of a login name and password is known
as:
(A) configuration
(B) accessibility
(C) authentication (D) logging in
(E) None of these
47. Which of the following would most likely NOT be a
symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning. (C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these