Q.1. ____________ is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet.
(1) Routing
(2) Network address translation (NAT)
(3) Signature referencing
(4) Packet filtering
(5) None of these
Q.2. Dynamic addressing makes it more difficult for hackers to find likely victims because ______.
(1) the ISP assigns counterfeit IP addresses.
(2) the IP address is protected by a firewall.
(3) the ISP hides the IP addresses for computers on their network.
(4) the IP address changes each time a user logs on to their ISP.
(5) None of these
Q.3. A macro virus is a virus that _______.
(1) does not rely on a host file
(2) is attached to a document file
(3) loads into memory when the computer first starts
(4) provides access to macros on the computer
(5) None of these
Q.4. ____________ computing is an efficient way of linking many computers together, when they are not otherwise in use, to utilize their capacity to perform complex calculations.
(1) Remote
(2) Grid
(3) Functional
(4) Automated
(5) None of these
Q.5. Which of the following features would be more likely to be found in tablet computers than in other mobile computing devices?
(1) Wireless ports
(2) Internet access
(3) Disk storage
(4) Handwriting recognition
(5) None of these
Q.6. A ____________ is a wireless computing device characterized by low power consumption and low cost.
(1) Bluetooth adapter
(2) tablet PC
(3) paging device
(4) cell phone
(5) None of these
Q.7. The type of battery that gains power based on the chemical reactions of alcohol enzymes is called ______.
(1) 9-volt
(2) Lithium ion
(3) Bio fuel cell
(4) Nickel based
(5) None of these
Q.8. Smart Media is a type of ______.
(1) Specialized processor
(2) Optical storage device
(3) File transfer system
(4) Flash card
(5) ATM card
Q.9. 253.45.67.9 is a class---------
(1) D
(2) A
(3) C
(4) E
(5) None of these
Q.10. Internal auditors should review data system design before they are ______.
(1) Developed
(2) Implemented
(3) Modified
(4) All of the above
(5) None of these
Answers:
Q.1 (2) NAT is a process that permits multiple computers to use the same IP address and hide their actual IP addresses from the Internet
Q.2 (4) Dynamic addressing makes it more difficult for hackers to find likely victims because the IP address changes each time a user logs on to their ISP
Q. 3 (2) A macro virus is a virus that is attached to a document file
Q. 4 (2) Grid computing is an efficient way of linking many computers together, when they are not otherwise in use, to utilize their capacity to perform complex calculations
Q.5 (4) Handwriting recognition features would be more likely to be found in tablet computers than in other mobile computing devices
Q.6 (3) Paging devices is a wireless computing device characterized by low power consumption and low cost
Q.7 (3) The type of battery that gains power based on the chemical reactions of alcohol enzymes is called Bio fuel cell
Q.8 (4) The SmartMedia (SM) card, a type of flash memory card, was also one of the first memory cards to be produced and used in digital cameras
Q.9 (4) 253.45.67.9 is a E class
Q.10 (2) Internal auditors should review data system design before they are implemented