Q.1. A method of hacking into a Bluetooth-enabled device and taking control is referred to as.
(1) Bluesnarfing (2) Bluehacking (3) Bluezombie (4) Bluebugging (5) None of these
Q.2. Face pattern-recognition systems are examples of ————.
(1) encryption authentication systems (2) Firewalls
(3) Biometric authentication devices (4) password protection devices
(5) None of these
Q.3. Spyware is a type of ——— program that usually downloads with other software you install from the Internet.
(1) firewall (2) piggyback (3) protocol (4) encryption (5) None of these
Q.4. Malicious code that alters your browser’s ability to find Web addresses is used in ————.
(1) piggybacking (2) adware (3) pharming (4) social engineering (5) None of these
Q.5. Backing storage is so named because it :
(1) is always kept at the back of the CPU
(2) is slow and backward
(3) backs up the computer’s main memory
(4) lags behind the main memory
(5) None of the above
Q.6. The ASCII code for the character J is :
(1) 1001 0001 (2) 1001 1010 (3) 0100 1010 (4) 1010 0001 (5) None of the above
Q.187. —————— form of semiconductor memory can be programmed and then erased at a latter time.
(1) SRAM (2) DRAM (3) EPROM (4) PROM (5) None of the above
Q.8. The process of updating a database ( or information system) immediately as changes are made, is known as —————.
(1) real-time processing (2) On-line processing (3) time processing (4) parallel processing (5) None of the above
Q.9. What is meant by a dedicated computer?
(1) Which is used by one person only (2) Which is assigned one and only one task
(3) Which uses kind of software (4) Which is meant for application software only
(5) None of these
Q.10. An instruction that transfers program control to one or more possible paths is known as -
(1) Utility program (2) System software (3) Broadband channel (4) Application program (5) None of the above
Answers
Q.1.(4) Q.2.(3) Q.3.(2) Q.4.(3) Q.5.(3) Q.6.(3) Q.7.(3) Q.8.(1) Q.9.(2) Q.10.(3)