1. What does 'GIF' Stands for?
a) Graphics Interchange Format
b) Geo Interchange Format
c) Graphical Interconnection Format
d) Graphics Interlace Format
e) Graphics Interchange File
2. Which tracking program records every keystroke you make on the computer?
a) ITrack/ULead
b) eFollow
c) Key logger
d) Stalking software
e) None of the above
3. What is the cyber-attack called when you are rerouted from your requested internet site to another, undesired site?
a) Phishing
b) Pharming
c) Redirecting
d) Hijacking
e) None of the above
4. Processing involves ________.
a) inputting data into a computer system
b) transforming input into output
c) displaying output in a useful manner
d) providing relevant answers
e) None of the above
5.What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
a) Spam
b) Phish
c) Cookie
d) Adware
e) None of the above
6.Which process checks to ensure the components of the computer are operating and connected properly?
a) Booting
b) Processing
c) Saving
d) Editing
e) None of the above
7. What kind of programming language is Java?
a) Object-oriented programming language
b) Relational programming language
c) Sixth-generation programming language
d) Database management programming language
e) None of the above
8. A set of instruction telling the computer what to do is called?
a) Mentor
b) instructor
c) compiler
d) program
e) debugger
9. When you save a Microsoft Access project, what file format do you use?
a) .adp
b) .Xml
c) .mbd
d) All of these
e) None of the above
10. The software that secretly collects information about the web client's internet habits?
a) Detect ware
b) Spam
c) Spyware
d) Pharming
e) All of the above
No comments:
Post a Comment