Computer Knowledge For CWE-Clerks-V- Main Examination

November 16, 2015    


Computer Knowledge For CWE-Clerks-V- Main Examination 

Q.1. Today’s email system is built on protocols that ______.

(1) Don’t ensure that each sender has a verifiable identity

(2) Automatically filter spam based on objectionable content

(3) Can be modified by anyone with systems administration clearance

(4) Apply directly to instant messaging systems

(5) All of the above

Ans. (1) Don’t ensure that each sender has a verifiable identity

Q.2. What percentage of email messages is junk email (spam)?

(1) Less than 10 percent

(2) About 20 percent

(3) About 30 percent

(4) About 40 percent

(5) More than 50 percent

Ans. (5) More than 50 percent of email messages is junk email (spam).

Q.3. Which of the following is not an antivirus program?

(1) AVG Antivirus

(2) Elk Cloner

(3) McAfee Virus Scan

(4) Kaspersky Antivirus

(5) ESET

Ans. (2) Elk Cloner is not an antivirus program

Q.4. Many experts say we’re at the beginning of a revolution that is creating a vast grassroots network of public and private wireless hubs based on _________.

(1) 3G technology

(2) Mesh network technology

(3) Wi-Fi technology

(4) Bluetooth technology

(5) Adaptive radio technology

Ans. (3) Many experts say we’re at the beginning of a revolution that is creating a vast grassroots network of public and private wireless hubs based on Wi-Fi technology.

Q.5. What should people who use a public hot spot be aware of?

(1) There is no such thing as free access to the Internet.

(2) Wireless connections cannot be used to surf the Web.

(3) A notebook computer must be plugged into a power source in order to connect to the network.

(4) Exposure to radio waves is harmful to pregnant women.

(5) Data transmitted over networks without WEP key encryption can be viewed by malicious eavesdroppers.

Ans. (5) Data transmitted over networks without WEP key encryption can be viewed by malicious eavesdroppers.

Q.6. Which of the following is not an antivirus program?

(1) AVG Antivirus

(2) Elk Cloner

(3) McAfee Virus Scan

(4) Kaspersky Antivirus

(5) ESET

Ans. (2) Elk Cloner is not an antivirus program.

Q.7. One limitation of antivirus programs is that they ______.

(1) Sometimes start behaving like viruses.

(2) are very expensive

(3) harm the computer

(4) can detect only those viruses for which they are programmed

(5) Sometimes destroy important documents

Ans. (4) Antivirus can detect only those viruses for which they are programmed.

Q.8. _____________ is unsolicited e-mail which is sent in massive quantities to e-mail users.

(1) Worm

(2) Pop-up

(3) Spam

(4) Outlook

(5) Draft

Ans. (3) Spam is unsolicited e-mail which is sent in massive quantities to e-mail users

Q.9. SSL stands for ________.

(1) Secure Socket Layer

(2) Secure Surfing Layer

(3) Secure Safe Learning

(4) Socket Secure Layer

(5) Secure Synchronized Layer

Ans. (1) SSL stands for Secure Socket Layer

Q.10. Firewall ________.

(1) amplifies weak outgoing signals to stronger ones.

(2) is the name of an open source browser

(3) prevents intruders from accessing your system.

(4) is the name of a computer virus.

(5) Is the name of a networking topology

Ans. (3) Firewall prevents intruders from accessing your system.


Computer Knowledge For CWE-Clerks-V- Main Examination 4.5 5 Yateendra sahu November 16, 2015 Computer Knowledge For CWE-Clerks-V- Main Examination  Q.1.  Today’s email system is built on protocols that ______. (1) Don’t ensure t...


Load comments

No comments:

Post a Comment