You are on page 1of 40


In a survey of more than 500 companies and government agencies, ____________ percent
detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C

2. The survey showed that these businesses lost more than ____________ due to security


A. $100,000 each

B. $377 million

C. five employees each

D. $1 million

Answer: B

3. The typical computer criminal is a(n):

A. young hacker.

B. trusted employee with no criminal record.

C. trusted employee with a long, but unknown criminal record.

D. overseas young cracker.

Answer: B

4. The majority of computer crimes are committed by:

A. hackers.

B. insiders.

C. overseas criminals.

D. young teenage computer geniuses.

Answer: B

5. The common name for the crime of stealing passwords is:

A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: C Reference: Theft by Computer

6. Collecting personal information and effectively posing as another individual is known as the crime


A. spooling.

B. identity theft.

C. spoofing.

D. hacking.

Answer: B

7. Malicious software is known as:

A. badware.

B. malware.

C. maliciousware.

D. illegalware.

Answer: B

8. A program that performs a useful task while simultaneously allowing destructive acts is a:

A. worm.

B. Trojan horse.

C. virus.

D. macro virus.

Answer: B Moderate

9. An intentionally disruptive program that spreads from program to program or from disk to disk is

known as a:

A. Trojan horse.

B. virus.

C. time bomb.

D. time-related bomb sequence.

Answer: B

10. In 1999, the Melissa virus was a widely publicized:

A. e-mail virus.

B. macro virus.

C. Trojan horse.

D. Time bomb.

Answer: A

11. What type of virus uses computer hosts to reproduce itself?

A. Time bomb

B. Worm

C. Melissa virus

D. Macro virus

Answer: B

12. The thing that eventually terminates a worm virus is a lack of:

A. memory or disk space.

B. time.

C. CD drive space.


Answer: A

13. When a logic bomb is activated by a time-related event, it is known as a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:

A. time-related bomb sequence.

B. virus.

C. time bomb.

D. Trojan horse.

Answer: C

15. What is the name of an application program that gathers user information and sends it to

someone through the Internet?

A. A virus

B. Spybot

C. Logic bomb

D. Security patch

Answer: B

16. Standardization of Microsoft programs and the Windows operating system has made the spread

of viruses:

A. more complicated.

B. more difficult.

C. easier.

D. slower.

Answer: C

17. HTML viruses infect:

A. your computer.

B. a Web page in the HTML code.

C. both a Web page and the computer that is viewing it.

D. No

Answer: B

18. Software programs that close potential security breaches in an operating system are known as:

A. security breach fixes.

B. refresh patches.

C. security repairs.

D. security patches.

Answer: D

19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is

known as:

A. a virus.

B. a Trojan horse.

C. cracking.

D. a denial of service attack.

Answer: D

20. ___________ is the measurement of things such as fingerprints and retinal scans used for

security access.

A. Biometrics

B. Biomeasurement

C. Computer security

D. Smart weapon machinery

Answer: A

21. What is the most common tool used to restrict access to a computer system?

A. User logins

B. Passwords

C. Computer keys

B. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n): A. To prevent the loss of data during power failures. C. B. B. C. . a firewall. firewall. cryptosystem. use a(n): A. D. C.D. love. C.S. encryption program. hacker-resistant server. encryption safe wall. C.2 Cryptography 26. encryption key. D. cryptology source. D. Answer: A 25. Answer: D Reference: How It Works: 10. 123. God. Fred. use a(n): A. scrambling. B. encryption. Answer: B 24. Access-control software Answer: B 22. D. Answer: D 23. password-proofing. firewall. surge protector. The most common passwords in the U. B. encryption software package. If you want to secure a message. hacker-proof program. or Britain include all EXCEPT: A. The scrambling of code is known as: A.

A. Cracking Answer: B 31. A. lock and key Answer: B . logins B. B. A(n) ____________ can shield electronic equipment from power spikes. firewall D. surge protector C. Hacking D. don’t borrow disks from other people. private and public keys Answer: C 30. passwords C. encryption D. firewall software C. UPS. Answer: D 27. Computer forensics B. Computer crime C. D. A. Freeware ___________ encrypts data. Answer: B 29.D. All of these are suggestions for safe computing EXCEPT: A. download shareware and freeware with caution. open all e-mail messages but open them slowly. ____________ is defined as any crime completed through the use of computer technology. encryption program B. disinfect your system. PGP D. A. C. UPS Answer: B 28. encryption B. Most computer systems rely solely on ___________ for authentication.

D. Over ___________ was spent by businesses and government to repair problems in regard to Y2K.32. Smart weapon D. Missile defense auto-system C. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people. or decision making? A. privacy rights. B. Independent system Answer: D 35. 20 million dollars B. Answer: B Fill in the Blank: 36. the number of cookies downloaded to your personal computer. Creating strong computer security to prevent computer crime usually simultaneously helps protect : A. B. personal space. A. 1 billion dollars D. 100 million dollars C. Autonomous system B. Security procedures can: A. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects. are inaccessible for the average home user. are prohibitively expensive. will eliminate all computer security risk. D. reduce but not eliminate risks. Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging . C. personal ethics. verification. Answer: A 33. C. 100 billion dollars Answer: D 34.

com found that ____________ are the most often cited online fraud cases. ____________ programs search for and eliminate viruses.37. Both viruses and ____________ use computer hosts to replicate. Answer: worms 45. The cost to the consumer is ____________. Answer: virus Reference: Viruses Difficulty: Easy 43. When you use a disk in several different computers within the same day. Answer: Cracking . Answer: online auctions Reference: Identity Theft 41. ____________ connections are the most frequent point of attack for Internet commerce. A survey by eMarketer. Answer: crime 38. ____________ refers to electronic trespassing or criminal hacking. Answer: macro virus 44. A security patch is a software program that closes possible security breaches in the operating system. ____________ is the most common form of computer crime. Answer: notebook 42. Computer ____________ often goes unreported because businesses fear negative publicity. ____________ was once the word used for malicious computer wizardry. Answer: Internet 39. Answer: Antivirus 46. Answer: nothing or free 47. Answer: Theft 40. Answer: Hackers or hacking 48. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks. Theft of computers is most common for PDAs and ____________ computers. you are taking the chance of contracting a(n) ____________.

A. National Infrastructure Protection Center F. created as a result of the first headline-making worm VII. DDoS stands for ___________. Match the acts and centers with their purposes: I. Answer: Webjackers 52. Answer: distributed denial of service 51. Answer: two Reference: How It Works: 10. Most operating systems. created by Attorney General Janet Reno in 1998 II. Telecommunications Act of 1996 D. defines what kinds of communications are legal online III. assign each user a unique ___________. C. Each individual who uses a public key cryptosystem has ___________ keys. ___________ software monitors and records computer transactions.2 Cryptography 54. DoS stands for ___________. E.49. D . created in 2001 as a response to the terrorist attacks of September 11. including Windows XP. Answer: denial of service 50. Computer Fraud and Abuse Act A. B. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know. Answer: Pretty Good Privacy 55. provides instant information on crimes and criminals V. 2001 IV. PGP stands for ___________. Communications Decency Act E. Digital Millennium Copyright Act C. ____________ hijack Web pages and redirect users to other sites. Answer: Audit-control 53. used to arrest a student for writing to crack an Adobe product Answers: F. Answer: attachments Matching: 57. G. USA Patriot Act B. National Crime Information Center G. declared unconstitutional by the Supreme Court VI. Answer: user identifier or user ID 56.

58. POS . spam. keep your disks in your own computer IV. copy. be aware of e-mail from what appear to be legitimate companies II. C. D. B. viruses. wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop. copy V. disinfect regularly C. use antivirus software Answers: C. A(n) ____________ system is a small. Data B. hackers. identity theft. A process known as ____________ is used by large retailers to study trends. D. Answer: B 2. A. data conversion Answer: A 3. A. PSS B. handle e-mail carefully B. encrypt VI. take your password seriously D. POS D. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. copy. Query Answer: B 4. Point-of-sale (POS) C. data selection C. Match the following rules of thumb about safe computing with the proper descriptions: I. don’t choose a dictionary word III. back it up E. Sales D. if it’s important. share with care A. B. sensitive info over the Internet? F. F. data mining B. E 1. A. All of the following are examples of real security and privacy risks EXCEPT: A.

when placed on an animal. B. GPS Answer: B 8.C. inventory D. Which of the following is NOT one of the four major data processing functions of a computer? A. . simulation. D. processing data into information C. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called: A. Technology no longer protected by copyright. Answer: C 6. data mining Answer: A 5. This technology is known as: A. robotics. computer forensics. available to everyone. POS B. gathering data B. can be used to record and track in a database all of the animal’s movements. analyzing the data or information D. B. is considered to be: A. proprietary. ____________ tags. C. RFID C. A. forecasting. D. computer forensics. storing the data or information Answer: C 7. Answer: A 9. robotics. C. animation. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. PPS D. simulation.

processing. Computer forensics D. experimental. Nanotechnology C. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. Information Answer: D 13. Answer: B 14. in the public domain. Computers gather data. Answer: A 10. which means that they allow users to ____________ data. A. Artificial intelligence (AI) Answer: D 12. present . Nanoscience B. organizing. Artificial intelligence Answer: A 11. Microelectrodes C. A process B. ____________ is data that has been organized or presented in a meaningful fashion. A. C. storing. Nanoscience B. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. Software C.B. B. C. D. Storage D. A. A. D. programming. Simulation D. The name for the way that computers manipulate data into information is called: A. open.

multimedia. Computers process data into information by working exclusively with: A. representational Answer: C 17. input. binary D. store Answer: B 15. eight kilobytes. numbers. C. . C. In the binary language each letter of the alphabet. data. After a picture has been taken with a digital camera and processed appropriately. B. the process. the actual print of the picture is considered: A. input C. Answer: D 18. eight bytes. C. eight bits. A. output D. words. kilobyte C. Computers use the ____________ language to process data. B. eight characters. D. D. processing B. The term bit is short for: A. B. characters. output. Answer: D 19. Answer: B 16.B. D. megabyte. each number and each special character is made up of a unique combination of: A.

binary language. A ____________ is approximately one billion bytes. A string of eight 0s and 1s is called a: A. bit C. A. kilobyte. megabyte. C. Answer: B 21. Hardware B. gigabyte. An application Answer: A 24. binary digit. B. byte. kilobyte B. megabyte Answer: C 22.B. The components that process data are located in the: A. C. Answer: C 20. A. binary number. system unit. C. D. output devices. terabyte Answer: C 23. A peripheral D. D. gigabyte D. B. A. A device C. ____________ is any part of the computer that you can physically touch. megabyte D. gigabyte B. input devices. . kilobyte C. A ____________ is approximately a million bytes.

motherboard B. mouse. storage component. keyboard. All of the following are examples of storage devices EXCEPT: A. printer Answer: A 27. expansion board. scanner B. also called the “brains” of the computer. printer. printers. B. speaker C. scanner. C. is responsible for processing data. . B. B. Answer: C 25. C. A. CD D. D. motherboard. Which of the following is an example of an input device? A. The CPU and memory are located on the: A. C. RAM D. storage device.D. All of the following are examples of input devices EXCEPT a: A. central processing unit (CPU) Answer: D 29. hard disk drives. floppy disk drives. Answer: D 26. D. memory C. CD drives. The ____________. Answer: B 28.

Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems. platform software. system software. spreadsheet. application Answer: D 33. A. Memory D. A processor Answer: B 32. operating system software. D. application software. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together. B. Word processing. platforms. applications. and photo-editing are examples of: A. Software C. ____________ is a set of computer programs used on a computer to help perform tasks. A. Answer: A 31. A. Answer: B 30. CPUs . The PC (personal computer) and the Apple Macintosh are examples of two different: A. processing C. output device. Answer: A 34. C. An instruction B. methods C. programs. management B. D. B.D. utility D. C. languages B. storage devices.

C. supercomputer. slow D. digital divide. mainframe. laptops D. Laptops D. client. storage devices Answer: C 35. . wireless C. D. C. A. DSL is an example of a(n) ____________ connection. broadband Answer: D 39. The difference between people with access to computers and the Internet and those without this access is known as the: A. Supercomputers C. A. Web divide. B. Servers B. A. Mainframes Answer: B 38. Servers are computers that provide resources to other computers connected to a: A. B. mainframes Answer: D 37. Internet divide. network. Smaller and less expensive PC-based servers are replacing ____________ in many businesses. ____________ are specially designed computers that perform complex calculations extremely rapidly. Answer: A 36. supercomputers B.D. clients C. network B.

A. A. The binary language consists of ____________ digit(s). bit B. Two C. 8 B.D. Artificial intelligence Answer: A 41. Answer: A 40. broadband divide. 1 Answer: B 44. Which of the following is the correct order of the four major functions of a computer? A. Input à Outputà Process à Storage C. Micro-technology C.000 D. binary digit C. 2 C. One thousand D. character . One million Answer: A 43. Process à Storage à Input à Output D. A byte can hold one ____________ of data. Nanotechnology B. Input à Process à Output à Storage Answer: D 42. A. Computer forensics D. ____________ bits equal one byte. A. 1. Eight B. Process à Output à Input à Storage B. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.

A. such as responses to questions or clicking an icon. A. communication B. the operating system. Mainframes Answer: B 48.D. Robotic computers D. B. . A. The platform B. B. The two broad categories of software are: A. D. transaction and application. system D. Embedded computers C. C. Answer: A 49. application C. The steps and tasks needed to process data. ____________ are specially designed computer chips that reside inside other devices. instructions. application software. The motherboard Answer: B 46. word processing and spreadsheet. are called: A. Servers B. word-processing software Answer: C 47. Application software D. The operating system is the most common type of ____________ software. the system unit. kilobyte Answer: C 45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer. such as your car or your electronic thermostat. The operating system C.

Answer: operating system 53. Answer: platform 54. and these steps and tasks are called ____________. Windows and Mac OS. the ____________ is the platform of choice for graphic design and animation.000 bytes. The metal or plastic case that holds all the physical parts of the computer is the: A. Between PCs and Macs. ____________software helps you carry out tasks. The ____________ is the program that manages the hardware of the computer system. B. Answer: instructions . Input devices are used to provide the steps and tasks the computer needs to process data. A ____________ is approximately 1. Answer: kilobyte 57. including the CPU. D. D. storage devices. such as typing a document or creating a spreadsheet. The type of operating system software you use depends on your computer’s ____________. Answer: Supercomputers 56. system unit. CPU.C. system and application. and input/output devices. Answer: Mac 52. Answer: Application 55. memory. Answer: A Fill in the Blank:- 51. mainframe. C. platform. Answer: D 50. ____________are the fastest and most expensive computers.

A string of ____________ 0s and 1s is called a byte. Answer: input 62. The binary language consists of two digits: ____________ and ____________. The devices you use to enter data into a computer system are known as ____________ devices. processes it. ____________ is the science that attempts to create machines that will emulate the human thought process. Answer: eight (8) 61. Answer: Mainframes 66. ____________is the application of computer systems and techniques to gather legal evidence. When you connect to the ____________. Answer: output 63. The devices on a computer system that let you see the processed information are known as ____________ devices. Answer: 0 and 1 60. Answer: Internet 65. ____________ are computers that excel at executing many different computer programs at the same time. A computer gathers data. Answer: stores 59.58. Answer: Software 64. Answer: Computer forensics 67. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks. and ____________ the data or information. outputs the data or information. your computer is communicating with a server at your Internet service provider (ISP). Answer: Artificial intelligence (AI) .

68. Answer: True 78. Answer: simulators True and False 76. and edit photos. Currently. a word. Answer: application 72. Answer: True . Hard disk drives and CD drives are examples of ____________ devices. Strictly defined. Macintosh computers use the Macintosh operating system (Mac OS). Answer: storage 71. or a sound. a computer is a data processing device. Answer: Microsoft Windows 69. Answer: computers 75. ____________ are computers that support hundreds or thousands of users simultaneously. whereas PCs generally run ____________ as an operating system. Answer: True 77. the performance of tasks by robots is based on preprogrammed algorithms. type documents. Answer: Mainframes 73. You would use ____________ software to create spreadsheets. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns. Answer: Identity theft 74. Surgeons are using ____________ to guide robots to perform delicate surgery. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans. Answer: data mining 70. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating. a picture. Data can be a number.

Answer: True 86.whereas mainframes are designed to handle many programs running at the same time (but at a slower pace). The CPU and memory are located on a special circuit board in the system unit called the motherboard. The discrepancy between the “haves” and “have-nots” with regard to computer technology is commonly referred to as the digital society. Clicking on an icon with the mouse is a form of giving an instruction to the computer.79. the programs that posethreats to computer security. Trend-spotting programs. Answer: True 88. have been used to predict criminal activity. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses. Answer: True 82. Answer: False . Employers do not have the right to monitor e-mail and network traffic on employee systems used at work. Nanostructures represent the smallest human-made structures that can be built. Answer: True 81. Answer: False 83. developed for business. Answer: False (memory) 85. Answer: True 87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible. Being computer fluent means that you should be able to build a computer yourself. Answer: True 84. Output devices store instructions or data that the CPU processes. Answer: False (digital divide) 80.

one million bytes II. one trillion bytes Answer: C. Match the following terms with their meanings: I. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network. a type of memory V. A 95. B. With a wireless network. scanner B. Match the following terms with their approximate size: I. a large. CPU D. it is easier to relocate devices. Answer: True 92. one thousand bytes IV. input device IV. A. expensive computer that supports hundreds or thousands of users simultaneously . printer A. kilobyte A. D. E 94. mainframe A. one billion bytes V. storage device II. E. a computer that provides resources to other computers connected to a network III. RAM C. embedded computer C.89. Answer: False (network adapter) 91. output device III. terabyte E. Answer: True 90. Embedded computers are self-contained computer devices that have their own programming and do not receive input. C. Answer: False (RAM) Matching: 93. Match the following terms with their meanings: I. byte B. the most expensive computers that perform complex calculations extremely rapidly II. processor Answer: B. D. CD drive E. The most common type of memory that the computer uses to process data is ROM. gigabyte C. megabyte D. supercomputer B. eight bits III.

a set of computer programs that enables hardware to perform different tasks V. a self-contained computer device that usually performs preprogrammed functions such as temperature control V. A.IV. operating system software generally used on PCs IV. server E. Match the following terms with their meanings: I. B 96. consists of 0s and 1s IV. the case that contains the system components III. system software A. D. processed data or information IV. information E. D. platform C. a set of programs used to accomplish a specific task V. E. Match the following terms with their meanings: I. system unit D. transforming data into information II. C. processing D. instructions C. it controls the way in which the computer system functions Answer: D. memory B. data or information that can be accessed again Answer: B. E. the representation of a fact or idea (unprocessed information) III. binary language B. the set of programs that enables computer hardware devices and application software to work together II. bit A. holds instructions or data that the CPU processes V. storage D. D. Microsoft Windows D. the science revolving around the use of nanostructures to build devices on an extremely small scale II. software A. B. output C. C. data A. E 98. Mac OS E. Match the following terms with their meanings: I. application software B. A 99. hardware B. Match the following terms with their meanings: I. short for binary digit . data that has been organized or presented in a meaningful fashion III. the most common type of system software. operating system C. PDA D. B 97. A. any part of the computer that you can physically touch IV. operating system software used on the Apple Macintosh Answer: A. the kind of operating system software you will use depends on this III. a small mobile computing device Answer: C. C. motherboard E. E. the main circuit board in the system unit II.

A 100. digital recreations of ruins Answer: C. computer forensics V. education D. that provide better integration and share common features . Programs from the same developer . archeology E. (A) Authentication (B) Main (C) Web (D) File (E) None of these 4. Match the following fields to the related computer technology: I. robotics and simulation IV. A data warehouse is which of the following ? (A) Can be updated by the end users (B) Contains numerous naming conventions and formats (C) Organized around important subject areas (D) Contains only current data (E) None of these 3. B. toolbars and menus are known as …. medicine A. business B. sold bundled together .V. data mining III. nanotechnology E. All of the following are examples of real security and privacy risks Except _____ (A) hackers (B) spam (C) viruses . B. (A) software suites (B) integrated software packages (C) software processing packages (D) personal information managers (E) none of these 2. D. A. C. E 1. steps and tasks necessary to process data into usable information Answer: D. E. law enforcement C. Internet research and virtual tours II. ______________ servers store and manages files for network users.

________ are specially designed computer chips reside inside other devices. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together. (A) management (B) processing (C) utility (D) application (E) None of these 8. The OSI model is divided into _______ processes called layers. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems . (A) Data (B) Sales (C) Query (D) (Point-of-sale (POS) (E) None of these 6. (A) Servers (B) Embedded computers (C) Robotic computers (D) Mainframes (E) None of these 9. The following are all computing devices . except……… (A) notebook computers (B) cellular telephones . such as your car or your electronic thermostat. (A) five (B) six (C) seven (D) eight (E) None of these 7.(D) identify theft (E) None of these 5.

and parallel and serial ports ____ (A) basic input/output system (B) secondary input/output system (C) peripheral input/output system (D) marginal input/output system (E) None of these 12. This part of operating system manages the essential peripherals. the the computer in possession of the ______ can trasmit data (A) packet (B) data (C) access method (D) token (E) None of these 11. disk drives. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer (A) The platform (B) Application software (C) Operating system (D) The motherboard (E) None of these 14. Servers are computers that provide resources to other computers connected to a ___________ (A) mainframe (B) network . ________ Viruses are often transmitted by a floppy disk left in the floppy drive (A) Trojan horse (B) Boot sector (C) Script (D) Logic bomb (E) None of these 13.(C) digital scanners (D) personal digital assistants (E) None of these 10. such as the keyboard. in a ring topology . screen .

and provide uncontrolled access to a database. maintain. URL stands for …….. (A) Universal Research List (B) Universal Resource List (C) Uniform Resource Locator (D) Uniform Research Locator (E) None of these 17. (E) None of these 19. (D) software system used to create. maintain and provide controlled access to a database (B) hardware system used to create. maintain. A database management system (DBMS) is a ………… (A) hardware system used to create . this causes: (A) data redundancy (B) information overload (C) duplicate data . When data changes in multiple lists and all lists are not updated. and provide controlled access to a database. (C) software system used to create. A goal of data mining includes which of the following? (A) To explain some observed event or condition (B) To confirm that data exists (C) To analyze data for expected relationships (D) To create a new data warehouse (E) None of these 16. maintain.(C) supercomputer (D) client (E) None of these 15. and provide uncontrolled access to a database. A Proxy server is used for which of the following? (A) To provide security against unauthorized users (B) To process client requests for web pages (C) To process client requests for database access (D) To provide TCP/IP (E) None of these 20.

Granting an outside organization access to internet web pages is often implemented using a (n) ____ (A) extranet (B) intranet (C) internet . (A) router (B) modem (C) node (D) cable (E) None of these 25. (A) Structures (B) Field markers (C) Field definition (D) Field names (E) None of these 24. A goal of normalization is to __________ (A) minimize the number of relationships (B) minimize the number of entities (C) minimize the number of tables (D) minimize the number of redundancy (E) None of these 26. _____________ are words that a programming language has set aside for its own use. (A) Control worlds (B) Reserved words (C) Control structures (D) Reserved keys (E) None of these 23. ______ describe what is database fields. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.(D) data inconsistency (E) None of these 21.

Chip is a common nickname for a (n): (A) transistor (B) resistor (C) integrated circuit (D) semiconductor (E) None of these 30. The design of the network is called the network: (A) architecture (B) server (C) transmission . Which term identifies a specific computer on the web and the main page of the entire site (A) URL (B) Web site address (C) Hyperlink (D) Domain name (E) None of these 28.(D) hacker (E) None of these 27.. The purpose of the primary key in a database is to: (A) unlock the database (B) provide a map of the data (C) uniquely identify a record (D) establish constraints on database operations. (A) QBE (B) SQL (C) OLAP (D) Sequel Server (E) None of these 29. (E) None of these 31. The code that relational database management systems use to perform their database task is referred to as ….

Personal logs or journal entries posted on the Web are known as: (A) listservs (B) Webcasts (C) blogs (D) subject directories (E) None of these 35. data type. Which of the following is NOT a type of broadband Internet connection? (A) Cable (B) DSL (C) Dial-up . (A) command – based user interface (B) GUI (C) system utility (D) API (E) None of these 36. The ____________ contains data descriptions and defines the name. and length of each field in the database.(D) type (E) None of these 32. The most frequently used instructions of a computer program are likely to be fetched from: (A) the hard disk (B) cache memory (C) RAM (D) registers (E) None of these 33. (A) data dictionary (B) data table (C) data record (D) data field (E) None of these 34. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.

worms and Trojan horses. (A) Boot-sector viruses (B) Macro viruses (C) Time bombs (D) Worms (E) None of these 40.(D) Satellite (E) None of these 37. that has a malicious intent. is known as: (A) spyware (B) adware (C) spam (D) malware (E) None of these 38. Linux is a (n) ____________ operating system. (A) numeric (B) required (C) calculated (D) validated (E) None of these 39. Software. such as viruses. (A) open-source (B) Microsoft (C) Windows (D) Mac (E) None of these 41. What is a backup? (A) Restoring the information backup (B) An exact copy of a system’s information (C) The ability to get a system up and running in the event of a system crash or failure (D) All of these (E) None of these . ____________ are viruses that are triggered by the passage of time or on a certain date. Making a field ______ means that it cannot be left blank.

file. file. file (C) character.42. record. field. Verification of a login name and password is known as: (A) configuration (B) accessibility (C) authentication (D) logging in (E) None of these 47. (E) None of these 43. database. (A) GUIs (B) Icons (C) Menus (D) Windows (E) None of these 45. ____________ are lists of commands that appear on the screen. file. database. database (D) Bit. byte.) followed by the file name (E) None of these 46. field. database (B) character. record. Which of the following would most likely NOT be a symptom of a virus? (A) Existing program files and icons disappear. field. record. Which of the following places the common data elements in order from smallest to largest (A) character. Which of the following statements is FALSE concerning file names? (A) Files may share the same name or the same extension but not both (B) Every file in the same folder must have a unique name (C) File extension is another name for file type (D) The file extension comes before the dot (. record. character. The internet is …… (A) a large network of networks (B) an internal communication system for a business (C) a communication system for the Indian government (D) All of these (E) None of these 44. . field.

Spam 2.Which among the following is a correct definition of “Digital Divide”? (A) gap between people having access to mobile and internet access (B) gap between people having access to internet /IT and no internet/IT .(B) The CD-ROM stops functioning. Phishing 4. (C) The Web browser opens to an unusual home page. (D) Odd messages or images are displayed on the screen.When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information. this is a case of __? (A)spam (B)hacking (C)Phishing (D)Vishing (E)Simulation Ans. Mobile Phones 3.Which among the following is not a security / privacy risk? (A)Spam (B)Hacking (C)Virus (D)Phishing (E)Vishing Ans. (E) None of these computer awarness for clerical 1.Now a days Vishing has become a criminal practice of using social engineering over which of the following? (A)Social networking sites (B)Mobile Phones (C)E-mails (D)Cyber cafés (E)All of the above Ans.

Which among the following is the most common source of Viruses to the hard disk of your computer? (A)Incoming Email (B)Outgoing Email (C)CD Roms (D)Websites (E)Mobile Ans. (A) Incoming Email 6. (A) World Wide Web Consortium 7.What is the fullform of W3C? (A)World Wide Web Consortium (B)World Wide Web Company (C)World Wide Web Center (D)World Wide Web Command (E)None of them Ans. (D) Patch 8.(C) gap between people having access to broadband and narrowband internet (D) gap between people having access to internet banking and normal banking (E)Gap between the people having an email account and no email account Ans. (B) gap between people having access to internet /IT and no internet/IT 5.What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal .Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider? (A)Version (B)Update (C)Help (D)Patch (E)Syntax Ans.

(A) ATM SafetyPIN 9. the next three indicate the bank and the last three digits signify the branch 10. (A) Virtual Keyboard 11.identification number (PIN) in reverse order? (A)ATM SafetyPIN (B)ATM SafetyPro (C)ATM SafetyCode (D)ATM SafetySign (E)ATM SafetyDigit Ans.ADSL data communications technology uses which of the following for faster data transmission ? (A)Voiceband modem (B)Wireless Modem (C)Copper telephone Lines (D)Sockets (E)None of the above . first three digits represent the city.Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry? (A)Virtual keyboard (B)Finger Touching (C)Touchscreen (D)ShapeWriter (E)Dasher Ans.In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits? (A)City (B)Bank (C)Branch (D)Account Type (E)None of the above Ans.

and fonts. (C) F11 14.Ans.Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markup language) from document presentation. including elements such as the layout.While browsing the internet . (C) Copper telephone Lines 12. (C) Firmware 15.Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuits (ASICs). (B) Cntrl + Z 13. What is full form? (A)Cascading Style Software (B)Clear Style Sheet (C)Cascading Style Sheet .While working on Microsoft World . programmable logic devices. which of the following key is used for full screen view? (A)F3 (B)F5 (C)F11 (D)F9 (E)F10 Ans.? (A)Hardware (B)Software (C)Firmware (D)Malware (E)Liveware Ans. colors. which among the following is the command for “Undo”? (A)Cntrl +A (B)Cntrl +Z (C)Cntrl +Y (D)Cntrl +C (E)Cntrl +V Ans. etc.

What is the purpose of keeping electronic devices such as computers.vhd) format for Virtual PC? (A)IBM (B)Microsoft (C)Intel (D)Google (E)Apple Ans. (A) Deduce Power Consumption 17.Which of the following company owns/ uses the Virtual Hard Disk (. (A) RAM 18. televisions.(D)Common Style Sheet (E)Conditional Style Sheet Ans. (B) Microsoft 19.What is Office Open XML? (A)A file format (B)A software (C)A electronic device . and remote controlled devices on Sleep mode? (A)Reduce Power consumption (B)Back Up (C)To write contents of RAM to hard disc (D)To improve download speed (E)None of the above Ans.Which of the following device is a volatile storage? (A)RAM (B)Hard Disc (C)Magnetic Tape (D)Floppy Disc (E)ROM Ans. (C) Cascading Style Sheet 16.

What is the ultimate purpose of Defragmentation? (A)Make the PC faster (B)Create More Free Space (C)Delete temporary files (D)Reduce Power consumption (E)All of the above Ans. (B) Create More Free Space is the main purpose however performance is also improved in most case .(D)An international standard (E)None of the above Ans. (A) A file format 20.