You are on page 1of 4

Co-curricular course: Semester-5: Assignment

Course Title: Analytic Ability and Digital Awareness


Note: Students must take the print out and write the answers using blue pen &
submit the assignment by 7th December 2023.

Name: UID:
Class & section: Roll No.
Answer the following questions:
1. First page of web site is called _________________________.
2. The ______________shows all the websites and page that we
have visited earlier (status bar/history/taskbar/browser list)
3. Who invented the World Wide Web (WWW) in 1989?
____________________________________________

4. ___________________________ is not a search engine.


(google/Yandex/gmail/bing)

5. An example of Internet Search Engine is _______________


(window/linux/yahoo/MS word)

6. Which of these is a technique that is used to verify a message’s


integrity? (Message Digest/Protocol/Decryption
algorithm/Digital signature)______________________________
7. Which of these is the world’s very first antivirus program?
(Tinkered/Creeper/Ray Tomlinson/Reaper) _________________
8. The DNS would translate any Domain name
into_________________ (IP/URL/Binary/Hex)
9. Which of these is the oldest techniques used by hackers for
phone hacking to make free calls? ___________________
(Phishing/phreaking/spraining/cracking)
10. What is the blank space outside the printing area on a page?
(clipart/margins/header/footer) ______________________

11. Name two types of page orientation


________________________ & __________________
12. Press __________ to open the help window in the MS Word
document.(F1/F2/F9/F11)

13. Ctrl + N is used to


(A) Save the Document
(B) Open the Document
(C) Create a New Document
(D) Close the Document

14. Who is the father of computer security?


a) August Kerckhoffs
b) Bob Thomas
c) Robert
d) Charles
15. Which of the following is defined as an attempt to steal, spy,
damage or destroy computer systems, networks, or their
associated information?
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
16. “Cyberspace” was coined by _________
a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman
17. Which of the following act violates cyber security?
a) Exploit
b) Attack
c) Threat
d) Vulnerability
18. Which of the following DDoS in mobile systems wait for the
owner to trigger the cyber attack?
a) botnets
b) programs
c) virus
d) worms
19. What does the term "Malware" stands for?

A. Malfunctioning Software
B. Malicious Firmware
C. Malfunctioning Hardware
D. Malicious Software

20. What does the term "VPN" stand for?

A. Virtual Personal Network


B. Virtual Private Network
C. Virtual Portable Network
D. Virtual Public Network

21. What does "DoS" stands for?

A. Denial of Software
B. Distributed Online Security
C. Data Overload Strike
D. Denial of Service

22. What number should replace the question mark?

23. If each of the letters in the English alphabet is assigned odd


numerical value beginning A = 1, B = 3 and so on, what will be
the total value of the letters of the word ‘INDIAN’?

24. Two faces of a cube are given below. Which number will be
opposite of 5? __________________

25.

________________________________________

You might also like