You are on page 1of 6

1.

The benefit of a computer network are :


a. Sharing hardware resource easily
b. Sharing information easily
c. Sharing input easily
d. A and B true
e. A,B and C true
2. There are many types of computer network, except :
a. LAN
b. WAN
c. MAN
d. BAN
3. There are many types of network topology, except :
a. Bust and mesht
4. A piece of computer hardawe designed to allow computers to communicate
over a computer network is :
a. NIC
b. LAN CARD
c. NEC
d. RAND CARD
e. A and B true
5. There are the devices to create a computer network, except :
a. VGA
6. Hardware can be divided into two categories,mentioned that :
a. Input/output device
7. A set of computer consists of metal, plastic, and other physical devices which
is called
a. Hardware
8. There are input device, except :
a. Harddrive
9. Video capturing devices connected to computers or computer networks, often
using USB
a. WEBCAM
10.A device that provides input by analyzing images, printed text, handwriting,
or an object is
a. SCANNER
11.Example of worm :
a. I Love U.txt
12.There are kind of malicious software but not infect files
a. WORM
13.The practice and study of creating a secret information
a. Cryptography
14.A cryptography is used in applications present in technologically advanced
societies, examples
a. Security of atm card
b. Computer password
c. Electronic commerce a message
d. A,B and C True
e. Hidden message

15.A machine called enigma to encrypt and decrypt the messages in world war II
used by
a. German
16.The example of cryptograhy
a. Enigma
17.The a secret text resulting from encryption process is
a. Chipper text
18.The art and science of writing hidden messages in such a way that no-one
apart from the sender and intended recipient even realizes there is hidden
message :
a. Stenography
b. Stegraphy
c. Steganom
d. Stagenoghrapy
e. All answer false
19.There are some technique steganography, except
a. A copy file to another file.
20.The origin of steganography from
a. Greek
21.The steganography usually use for
a. Covered
b. Hidden writing
c. Copy
d. Backup
e. A and B true
22.What is the internet
a. A worldwide connection of millions of computers connected to
thousands of different networks
23.Many kind of internet services, mentioned that
a. Browser
b. World wide web
c. FTP
d. B and C true
e. Wireless network
24.the examples of serach engine
a. IRC
b. Yahoo messenger
c. Google talk
d. A,B and C true
25.There are the examples of search engine
a. Google chrome
b. Mozila firefox
c. Internet explore
d. Opera
e. All answer false
26.What is the function internet addres domain
a. Host machine has a special internet protocol addres(IP addres) that
uniquely identifies that computer

27.Method of creating, transmitting, or storing primaly text-based human


communications with digital communications system is
a. Email
28.The are several part of email
a. Header
b. Word wide web
c. Message body
d. A and C true
e. Address
29.There are the examples of email address, except
a. tonny@googles.com
30.What kinds of document that could attach file to email
a. Images
b. Pdf file
c. Doc file
d. Music file
e. All answer true
31.What is the meaning of bcc
a. Blind carbon copy
32.What is the website
a. A site(location) contains a collection of pages on the world wibe
33.The function of website
a. Search information
34.A program that search documents for specified keywords
a. Search engine
35.A document written in hypertext mark-up language(HTML)
A. WEB PAGE
36.The examples of serach engine
a. Bing, google , ask , yahoo
37.A NIC, , and a hub are needed to create a basic network
a. Repeaters
38.The network allows computers to with each other
a. Communicate
39.NIC can be identified easily. Is has a special port called
a. RJ-45
40.Another term for NIC is
a. Network adapter
41.Wht does ARPA stand for?
a. Advanced research project agency
42.Steganography is the art and science of writing message
a. Hidden
43.Another secret coding technique besides steganography is
a. Cryptography
44.Steganography comes from language
a. Greek
45.Writing a hidden message can use an ink
a. Invisible
46.This document can be used as a media in steganography, except
a. None of the above
47.Nazi used a machine called to encrypt and decrypt the messages.

a. Enigma
48.A cryptographer is who is master in cryptography
a. Someone
49.graphy is a greek word means
a. Written
50.Cryptography is needed to a secret document
a. Secure
51.A secret text resulting from encryption process is called
a. Cipher text
52.Nowadays computer is used for the following purpose, except
a. None of the above
53.The most commonly used input device is
a. Keyboard
54.A house size computer is computer
a. The first generation
55.This is a picture of
a. Transistor
56.Information can be stores in a storing device such as
a. CD-ROM (optical disk)
57.Cpu stand for
a. Central processing unit
58.In apple computer, motherboard is called
a. Logic board
59.Companies that produce processor are intel,IBM,and
a. AMD
60.The speed of a modem is measured by menas
a. KBPS
61.This method is called wireless. It menas
a. Without cable
62.The two major software are
a. Application and system software
63.The term software was first used by in 1958.
a. John W. Tukey
64.An open source software means it is
a. Freely redistributed
65.These are types of operating system available to users, except
a. GUIs
66.World processor such M.word 2007 and open office writer are examples of
a. Application software
67.This component application allows peoples connected over the internet to
participate in dicussions
a. IRC
68.This website is owned by a nonprofit institution
a. http://www.car.org
69.This website is a government agency
a. Training.fema.gov
70.The netiquette number 4 states that you shall not use a computer to
a. Steal
71.Recreational newsgroups start with
a. Rec

72.The conventional mail is called


a. Snail email
73.An email message made up of
a. Server
74.Commercial offers sent to our email without our request is called
a. Spam
75.In message header, to is for the
a. Recipients address
76.Is uses e-mail to duplicate themselves into vulnerable computers
a. Email worm
77.The first actual web serach engine was developed by matthew gray in 1993
and was called
a. Wandex
78.Search engines powered by robots are called
a. Spiders
79.At present ther e are stil text-based are called
a. Lynx
80.The following are search engines, except
a. WIN VISTA
81.What does URL stand for?
a. Uniform resourch locator
82.In programing process, the first step is
a. Writing a code
83.The physical devices in a computer are
a. Hardware
84.A programmer must compile the source code is called
a. Debugging
85.The following is a programming language from sun microsystems
a. JAVA
86.One of these is not malware
a. Identification
87.By its wy to infect other file, virus can be divided into categories
a. Three/3
88.The simplest and easiest way in creating virus is by using a tool called
a. Virus generator
89. actually speards through a network or the internet using email.
a. Worm
90.Which is an example of a pointing device?
a. Trackball
91.AZERTY keyboard layout is used in
a. Both a and b
92.Computer speakers are commonly equipped with a low-powwer amplifier
a. Internal
93.The trackball was invented by
a. Tom Cranston
94.Visual display unit is another term for
a. monitor

You might also like