ICT

Beschreibung

Quiz am ICT, erstellt von No Name am 04/06/2019.
 No Name
Quiz von No Name, aktualisiert more than 1 year ago
 No Name
Erstellt von No Name vor mehr als 5 Jahre
4370
0

Zusammenfassung der Ressource

Frage 1

Frage
1. What is the number one concern about cloud computing?
Antworten
  • • Too expensive
  • • Security concerns
  • • Too many platforms
  • • Accessibility

Frage 2

Frage
2. Google Docs is a type of cloud computing
Antworten
  • True
  • False

Frage 3

Frage
3. Which one of these is not a cloud computing pricing model
Antworten
  • • Pay Per Use
  • • Subscription
  • • Ladder
  • • Perpetual License

Frage 4

Frage
4. Which of these is not a major type of cloud computing usage
Antworten
  • • Hardware as a service
  • • Platform as a service
  • • Software as a service
  • • Infrastructure as a service

Frage 5

Frage
5. An Internet connection is necessary for cloud computing interaction
Antworten
  • True
  • False

Frage 6

Frage
6. “Cloud” in cloud computing represents what
Antworten
  • Wireless
  • Hard drives
  • People
  • Internet

Frage 7

Frage
7. Which of these should a company consider before implementing cloud computing technology. I: Employee satisfaction, II: Potential cost reduction, III: Information sensitivity
Antworten
  • • Only I
  • • Only II
  • • Only III
  • • I, II, and III

Frage 8

Frage
8. What exactly is cloud computing
Antworten
  • • A way to organize desktop computers
  • • Lightweight software that takes up little space on a hard drive
  • • Computing resources that can be accessed on demand, like electricity from a utility
  • • The World Wide Web

Frage 9

Frage
9. What widely used service is built on cloud-computing technology? I: Twitter, II: Skype, III: Gmail, IV: YouTube.
Antworten
  • • Only I
  • • Only II
  • • Only III and I
  • • I, II, III and IV

Frage 10

Frage
10. Cloud computing embraces many concepts that were previously touted as the next big thing in information technology. Which of these is not an antecedent(предшествующее) of the cloud?
Antworten
  • • Utility computing
  • • Remote hosted services
  • • Grid computing
  • • Desktop computing

Frage 11

Frage
11. What does SQL stand for
Antworten
  • • Structured Query Language
  • • Strong Question Language
  • • Structured Question Language
  • • Structured Querty Language

Frage 12

Frage
12. Which SQL statement is used to extract data from a database?
Antworten
  • • Select
  • • GET
  • • OPEN
  • • Extract

Frage 13

Frage
13. Computerized representations of models and attributes of real or simulated entities are?
Antworten
  • • Data
  • • Knowledge
  • • Information
  • • Database

Frage 14

Frage
14. Representation of the results of a computational process, such as statistical analysis, or the transcripts of some meanings assigned by human beings is
Antworten
  • • Data
  • • Knowledge
  • • Information
  • • Database

Frage 15

Frage
15. Representation of the results of a computer-simulated cognitive process, such as perception, learning, association, and reasoning is
Antworten
  • • Data
  • • Knowledge
  • • Information
  • • Database

Frage 16

Frage
16. Continuous representation, similar to the actual information it represents is
Antworten
  • • Analog data
  • • Digital data
  • • Continuous data
  • • Discrete data

Frage 17

Frage
17. A discrete representation, breaking the information up into separate(discrete) elements is
Antworten
  • • Analog data
  • • Digital data
  • • Continuous data
  • • Discrete data

Frage 18

Frage
18. Two bits can represent
Antworten
  • • Four things
  • • Two things
  • • Eight things
  • • Ten things

Frage 19

Frage
19. The extended version of the ASCII character set is not enough for international use
Antworten
  • • Unicode
  • • Barcode
  • • EBCDIC
  • • Binary code

Frage 20

Frage
20. The Unicode character set uses _________ per character
Antworten
  • • 16 bits
  • • 8 bits
  • • 4 bits
  • • 32 bits

Frage 21

Frage
21. The first 256 characters in the Unicode character set correspond exactly to the extended ASCII character set
Antworten
  • True
  • False

Frage 22

Frage
22. List the levels of computer systems from top to down
Antworten
  • • users, application software, operating system software, and the hardware system
  • • application software, operating system software, users, and the hardware system
  • • application software, users,operating system software, and the hardware system
  • • hardware system, operating system software, application software, and users

Frage 23

Frage
23. List the levels of computer systems from bottom to up
Antworten
  • • users, application software, operating system software, and the hardware system
  • • application software, operating system software, users, and the hardware system
  • • application software, users,operating system software, and the hardware system
  • • hardware system, operating system software, application software, and users

Frage 24

Frage
24. Which software refers to application software?
Antworten
  • • Microsoft Word
  • • Microsoft Windows
  • • Unix
  • • Mac OS

Frage 25

Frage
25. Which software refers to application software?
Antworten
  • • Internet Explorer
  • • Microsoft Windows
  • • Unix
  • • Mac OS

Frage 26

Frage
26. Which software refers to application software?
Antworten
  • • Macromedia Dreamweaver
  • • Microsoft Windows
  • • Unix
  • • Mac OS

Frage 27

Frage
27. Which software refers to application software?
Antworten
  • • Adobe Acrobat Reader
  • • Microsoft Windows
  • • Unix
  • • Mac OS

Frage 28

Frage
28. Which software refers to system software?
Antworten
  • • Macromedia Dreamweaver
  • • Microsoft word
  • • Internet Explorer
  • • Microsoft Windows

Frage 29

Frage
29. Which software refers to system software?
Antworten
  • • Macromedia Dreamweaver
  • • Microsoft word
  • • Internet Explorer
  • • Unix

Frage 30

Frage
30. Which software refers to system software?
Antworten
  • • Macromedia Dreamweaver
  • • Microsoft word
  • • Internet Explorer
  • • Mac OS

Frage 31

Frage
31. What is the master controller for all activities that take place within a computer
Antworten
  • • Operating System
  • • Application Software
  • • DBMS
  • • Word processor

Frage 32

Frage
32. What does send data from a computer over a network, and collects incoming data sent by other computers
Antworten
  • • A network interface card (NIC)
  • • A modem
  • • Phone line or cable
  • • Internet service provider

Frage 33

Frage
33. What is a device that enables data from a computer to be transmitted via phone lines or television cable lines to reach other computers on the Internet?
Antworten
  • • A network interface card (NIC)
  • • A modem
  • • Phone line or cable
  • • Internet service provider

Frage 34

Frage
34. What was the first computer prototype used vacuum tubes?
Antworten
  • • ENIAC
  • • Analytical Engine
  • • Abacus
  • • Hollerith Tabulating Machine

Frage 35

Frage
35. What is the main component that executes instructions stored in the main memory?
Antworten
  • • Microprocessor
  • • Main memory
  • • Storage device
  • • Peripheral

Frage 36

Frage
36. What does store instructions to be executed by the microprocessor?
Antworten
  • • Microprocessor
  • • Main memory
  • • Storage device
  • • Peripheral

Frage 37

Frage
37. What do store data permanently even when the computer is turned off?
Antworten
  • • Microprocessor
  • • Main memory
  • • Storage device
  • • Peripheral

Frage 38

Frage
38. What enable data input and output?
Antworten
  • • Microprocessor
  • • Main memory
  • • Storage device
  • • Peripheral

Frage 39

Frage
39. What acts as the traffic cop controlling the flow of data and coordinating interactions among components in the system?
Antworten
  • • Microprocessor
  • • Main memory
  • • Storage device
  • • Chipset

Frage 40

Frage
40. What does provide sockets for microprocessor and memory chips, slots for circuit boards, and the circuitry that enable electrical signals to travel from component to component?
Antworten
  • • Motherboard
  • • Power supply
  • • Microprocessor
  • • Chipset

Frage 41

Frage
41. What does provide electrical power to the computer system?
Antworten
  • • Motherboard
  • • Power supply
  • • Microprocessor
  • • Chipset

Frage 42

Frage
42. What does process instructions stored in main memory?
Antworten
  • • Motherboard
  • • Power supply
  • • Microprocessor
  • • Chipset

Frage 43

Frage
43. What does serve as a socket on the motherboard into which an expansion card maybe inserted?
Antworten
  • • Expansion slot
  • • Motherboard
  • • Power supply
  • • Microprocessor

Frage 44

Frage
44. What does enable a computer to control peripheral devices such as the monitor and the microphone?
Antworten
  • • Expansion card
  • • Motherboard
  • • Power supply
  • • Microprocessor

Frage 45

Frage
45. What does control data flow among components?
Antworten
  • • Chipset
  • • Motherboard
  • • Power supply
  • • Microprocessor

Frage 46

Frage
46. What does transfer data from storage devices to the motherboard?
Antworten
  • • IDE (Integrated Drive Electronics) cable
  • • Motherboard
  • • Power supply
  • • Microprocessor

Frage 47

Frage
47. What does store data permanently (even after the computer is turned off)?
Antworten
  • • Disk drives
  • • Motherboard
  • • Power supply
  • • Microprocessor

Frage 48

Frage
48. What step of the fetch-execute cycle enables the control unit of the CPU to decode the instruction and direct the necessary data to be moved from memory to the ALU?
Antworten
  • • Interpret
  • • Fetch
  • • Execute
  • • Store

Frage 49

Frage
49. What science studies how to refine the design of products to optimize them for human use?
Antworten
  • • Ergonomics
  • • HCI
  • • Economics
  • • ICT

Frage 50

Frage
50. What DOS command is used to change the working directory?
Antworten
  • • сd
  • • md
  • • rd
  • • ren

Frage 51

Frage
51. What DOS command is used to make a new directory?
Antworten
  • • cd
  • • md
  • • rd
  • • ren

Frage 52

Frage
52. What DOS command is used to remove an existing empty directory?
Antworten
  • • cd
  • • md
  • • rd
  • • ren

Frage 53

Frage
53. What DOS command is used to rename a file within a directory?
Antworten
  • • cd
  • • md
  • • rd
  • • ren

Frage 54

Frage
54. The BIOS initiates the POST (Power-On Self Test) sequence
Antworten
  • • True
  • • False

Frage 55

Frage
55. The BIOS enables the video card
Antworten
  • • True
  • • False

Frage 56

Frage
56. The BIOS counts and tests memory
Antworten
  • • True
  • • False

Frage 57

Frage
57. The BIOS checks for expansion cards and adapters and initializes them
Antworten
  • • True
  • • False

Frage 58

Frage
58. The BIOS follows a search order to find the Master Boot Record
Antworten
  • • True
  • • False

Frage 59

Frage
59. Interrupt Handler saves contents of registers before it saves the register for its own purposes
Antworten
  • • True
  • • False

Frage 60

Frage
60. Interrupts can nest infinitely (гнездиться бесконечно)
Antworten
  • • True
  • • False

Frage 61

Frage
61. Interrupt Handler accepts the byte of incoming data
Antworten
  • • True
  • • False

Frage 62

Frage
62. Interrupt Handler places the byte in a storage area
Antworten
  • • True
  • • False

Frage 63

Frage
63. Interrupt handler cannot be interrupted by a higher priority interrupt
Antworten
  • • True
  • • False

Frage 64

Frage
64. Interrupt handler transfers control back to previous task
Antworten
  • • True
  • • False

Frage 65

Frage
65. Which of the following are common behaviors of computer viruses? I. Self-replication; II. Infliction of physical damage to the computer's hardware; III Unwarranted file removal
Antworten
  • • I and II only
  • • II and III only
  • • I and III only
  • • I, II, and III

Frage 66

Frage
66. Which of the following computer attack methods does not require a hardware or software tool?
Antworten
  • • Port scanning
  • • Social engineering
  • • Spoofing
  • • Packet sniffing

Frage 67

Frage
67. What does a packet sniffer do?
Antworten
  • • Captures data packets that are transmitted through a network
  • • Renders a computer network unusable
  • • Causes one computer to impersonate another
  • • Converts encrypted passwords to plain text

Frage 68

Frage
68. A computer attack that uses handler computers to control agent computers to attack a target computer is known as a _____ attack.
Antworten
  • • Smurf
  • • SYN
  • • network connectivity
  • • distributed denial of service

Frage 69

Frage
69. Attacking a computer by sending it an excessive number of email messages is known as
Antworten
  • • Smurfing
  • • Spoofing
  • • Spamming
  • • Pinging

Frage 70

Frage
70. With respect to security on the Internet, what is the purpose of digital signatures?
Antworten
  • • To verify the identity of a message sender
  • • To request receipts for all sent messages
  • • To post anonymous messages to bulletin boards
  • • To encrypt mail messages

Frage 71

Frage
71. One of the most common applications of encryption is transmitting data securely over the Web is ______
Antworten
  • • the Secure Socket Layer (SSL)
  • • a Trojan horse
  • • e-mail
  • • a simple substitution code

Frage 72

Frage
72. Which encryption method uses a pair of digital keys?
Antworten
  • • Active-X
  • • SSL
  • • Public key encryption
  • • S-HTTP

Frage 73

Frage
73. Which of the following reasons is (are) valid for why "IITU" is a bad password? I. It is a word from the dictionary; II It does not contain numbers and symbols; III. It is the name of an institution
Antworten
  • • I and II only
  • • II and III
  • • I, II, and III
  • • I and III only

Frage 74

Frage
74. Embedding different types of data, such as sound and graphics, within Internet electronic mail requires which of the following formats to be used for encoding the data?
Antworten
  • • TCP/IP
  • • GIF
  • • MIME
  • • Encryption

Frage 75

Frage
75. ISPs can be accessed by which of the following ways? I. Telephone lines II. Cable television systems III. Personal satellite dishes
Antworten
  • • I only
  • • I and II only
  • • I, II, and III
  • • II only

Frage 76

Frage
76. The numbers in IP addresses are separated by
Antworten
  • • points
  • • periods
  • • colons
  • • commas

Frage 77

Frage
77. What knits the Internet together and allows data to travel smoothly over the communications links provided by NSPs worldwide?
Antworten
  • • FTP
  • • TCP/IP
  • • HTTP
  • • URL

Frage 78

Frage
78. What networks are useful in environments where wiring is difficult to install?
Antworten
  • • Twisted pair
  • • Coaxial
  • • Wirefree
  • • Wireless

Frage 79

Frage
79. What top-level domain belongs to computers in the category of commercial businesses?
Antworten
  • • bus
  • • com
  • • org
  • • bsn

Frage 80

Frage
80. An IP address is a set of four numbers between 0 and
Antworten
  • • 128
  • • 24
  • • 16
  • • 255

Frage 81

Frage
81. What top-level domain belongs to computers in the category of networks and ISPs?
Antworten
  • • adm
  • • int
  • • net
  • • html

Frage 82

Frage
82. What top-level domain belongs to computers in the category of professional and nonprofit organizations?
Antworten
  • • com
  • • npo
  • • org
  • • edu

Frage 83

Frage
83. Which of the following is (are) true about thick and thin clients in a client-server system? I. Thin clients perform relatively little work. II.A Web browser is an example of a thick client. III.A handheld computer is a typical example of a thin client.
Antworten
  • • I and III only
  • • I, II, and III
  • • III only
  • • I only

Frage 84

Frage
84. When you send an email to someone, it is sent to
Antworten
  • • the sender's email server
  • • the sender's email client
  • • the recipient's computer
  • • the recipient's email server

Frage 85

Frage
85. Using a(n) _____ protocol, the sender and the receiver are synchronized by a signal called a clock
Antworten
  • • synchronous
  • • asynchronous
  • • analog
  • • block

Frage 86

Frage
86. The bandwidth (пропускная способность) of a(n) _____ signal is usually measured in bits per second.
Antworten
  • • video
  • • digital
  • • satellite
  • • analog

Frage 87

Frage
87. What type of cable is typically used to carry cable television signals because its high capacity allows it to carry signals for more than 100 television channels simultaneously?
Antworten
  • • BNC
  • • STP
  • • UTP
  • • Coaxial

Frage 88

Frage
88. A communications _____ is a physical path or frequency for a signal transmission.
Antworten
  • • band
  • • channel
  • • protocol
  • • bridge

Frage 89

Frage
89. Which of the following terms represents the transmission capacity of a communications channel?
Antworten
  • • Indexing
  • • Frequency
  • • Bandwidth
  • • Resolution

Frage 90

Frage
90. Which of the following are commonly used network topologies? I.Star II. Ring III.Modems
Antworten
  • • I and II only
  • • III only
  • • II and III only
  • • I and III only

Frage 91

Frage
91. When two devices communicate, they must agree on protocols for I.starting and ending a transmission II.recognizing transmission errors III.determining the rate of data transmission
Antworten
  • • II and III only
  • • I and II only
  • • I, II, and III
  • • I and III only

Frage 92

Frage
92. Modems transfer data between computers by converting between
Antworten
  • • analog and digital
  • • Ethernet and digital
  • • video and sound
  • • analog and Ethernet

Frage 93

Frage
93. Which of the following are potential communications links? I. Telephone wiring II. Fiber-optic cable III. Satellite
Antworten
  • • I and II only
  • • II only
  • • I, II, and III
  • • III only

Frage 94

Frage
94. What kind of waves provides wireless transmission for mobile communications, such as cellular telephones, and for stationary communications where it is difficult or impossible to install cabling, such as in remote, geographically rugged regions?
Antworten
  • • Infrared
  • • Radio
  • • UTP
  • • Line-of-sight

Frage 95

Frage
95. Which of the following are protocols associated with Internet email? I.SMTP II.POP III. FTP
Antworten
  • • I and III only
  • • I and II only
  • • I, II, and III
  • • II and III only

Frage 96

Frage
96. Which of the following services may be provided by an ISP? I. A temporary IP address II. An account on the ISP's email server III. Web hosting of the customer's Web page
Antworten
  • • II and III only
  • • I, II, and III
  • • I and II only
  • • I and III only

Frage 97

Frage
97. What is a backbone provider (also known as a Network Service Provider)?
Antworten
  • • A group of small providers that work together to provide Internet access
  • • Any company that provides Web-based services
  • • A provider of national and international network links for the Internet
  • • The largest provider of Internet access within a particular region

Frage 98

Frage
98. With respect to the Internet, routers are used to connect
Antworten
  • • a computer and a modem
  • • a computer to the Internet
  • • any two computers
  • • different networks of computers

Frage 99

Frage
99. With respect to the Internet, companies need to register a unique domain name when
Antworten
  • • buying a new modem
  • • establishing an electronic commerce Web site
  • • buying a new computer
  • • connecting a new computer to the Internet

Frage 100

Frage
100. Which of the following are tasks performed by a Web browser? I. Sending a request for a specific file to a server II. Formatting and displaying a file received from a server III. Sending additional requests to the server to retrieve any graphics elements such as icons or images for a requested file
Antworten
  • • I, II, and III
  • • I and III only
  • • II and III only
  • • I and II only

Frage 101

Frage
101. What is the protocol used to transfer Web pages?
Antworten
  • • html
  • • http
  • • udp
  • • ftp

Frage 102

Frage
102. What is the name of the Internet protocol used to make sure messages are reliably transmitted and received by the destination computer?
Antworten
  • • TCP
  • • ISP
  • • IP
  • • POP

Frage 103

Frage
103. The World Wide Web is
Antworten
  • • the same as the Internet
  • • a software package
  • • a client/server application program used to access the Internet
  • • a collection of Web servers throughout the world

Frage 104

Frage
104. When a fully explicit URL such as http://www.iitu.kz is provided to an Internet browser, "http" refers to the name of the
Antworten
  • • domain where the Web server resides
  • • language in which the page is written
  • • Web server containing the Web page
  • • protocol used to perform the operation

Frage 105

Frage
105. IP host addresses on the Internet are composed of which of the following?
Antworten
  • • A 24-bit number
  • • A single decimal number ranging from 0 to 255
  • • Four decimal numbers ranging from 0 to 255
  • • Any number of lowercase alphanumeric characters

Frage 106

Frage
106. After gaining access to a computer system, hackers will typically do which of the following? I. Set up control for further attacks II.Take, alter, or delete data III. Use the computer system resources
Antworten
  • • I, II, and III
  • • II and III only
  • • I and II only
  • • II only

Frage 107

Frage
107. Which of the following is (are) true regarding network bandwidth attacks? I.They can be used to launch a denial of service attack. II.They can cause a Web site to become unavailable. III.They work by flooding a network with traffic.
Antworten
  • • I and II only
  • • II and III only
  • • I, II, and III
  • • I and III only

Frage 108

Frage
108. Which of the following computer attacks is spoofing?
Antworten
  • • Using a program to decrypt passwords
  • • Monitoring a network to intercept data
  • • Using one computer to impersonate another
  • • Accessing an unprotected port on a computer

Frage 109

Frage
109. The method of cracking a password by trying all possible alphanumeric combinations is known as a _____ attack
Antworten
  • • port scanning
  • • dictionary
  • • brute force
  • • man-in-the-middle

Frage 110

Frage
110. After loading a word processor document from a floppy, a user's computer begins to show symptoms of being infected by a virus.Which of the following is true concerning this situation?
Antworten
  • • The document text could have contained an embedded virus.
  • • The word processing program checks all documents for viruses before using them, so the source the virus was not the document.
  • • A document cannot contain a virus, so the source of the virus was not the word processing document.
  • • The document could have contained a macro that contained a virus.

Frage 111

Frage
111. Which of the following is email spoofing?
Antworten
  • • Sending large amounts of unsolicited email
  • • Sending viruses through email
  • • Modifying an email header to fake the email source
  • • Intercepting email by monitoring a network

Frage 112

Frage
112. Which of the following is (are) true regarding a Smurf attack? I.It can use the ping command to perform the attack.II.It allows a hacker to steal data from a computer.III.It uses other computers on a network to attack a single computer
Antworten
  • • II and III only
  • • I and III only
  • • I and II only
  • • I, II, and III

Frage 113

Frage
113. Which of the following consequences of executing a virus on a PC is (are) possible? I.Files appear to be missing or deleted from the hard disk. II.Either the PC system board or a disk drive is physically damaged. III.There is low computer memory on disks.
Antworten
  • • II and III only
  • • I only
  • • I and III only
  • • I, II, and III

Frage 114

Frage
114. Which of the following is (are) true regarding computer security attacks? I. Hackers can cause home computers to attack other computers. II. Organizations typically experience more computer security breaches from internal personnel than from people external to the organization.
Antworten
  • • I only
  • • II only
  • • None
  • • I and II √

Frage 115

Frage
115. Which of the following is (are) true regarding network connectivity attacks? I. A network connectivity attack can be achieved by generating numerous half-open connections to the target computer. II. A network connectivity attack can be achieved by generating excessive amount of traffic on the target network.
Antworten
  • • I and II
  • • None
  • • I only
  • • II only

Frage 116

Frage
116. Which of the following can be used to prevent social engineering attacks? I. Verifying identities of people requesting sensitive information II. Using data encryption III. Being aware of computer fraud schemes
Antworten
  • • II and III only
  • • I, II, and III
  • • I and III only
  • • III only

Frage 117

Frage
117. Which of the following is (are) true about encryption of data? I.Given the high speed and low cost CPUs available, even the most complex encrypted data is not entirely safe for a long period of time. II.The more bits in the key of the encryption algorithm, the harder it is to break the encryption. III.In public key encryption, the sender and the receiver of encrypted data both use the same key value to encrypt and decrypt the data.
Antworten
  • • I and III only
  • • I, II, and III
  • • II and III only
  • • I and II only

Frage 118

Frage
118. How does a receiver of an encrypted message verify that the message originated from the sender?
Antworten
  • • The receiver compares the message with the decrypted signature of the sender.
  • • The receiver compares the message hashed with the sender's signature.
  • • The receiver compares the message hashed with the decrypted signature of the sender.
  • • The receiver compares the received message with the sender's signature.

Frage 119

Frage
119. To encrypt a message using public-key encryption scheme, which of the following must be done?
Antworten
  • • Encrypt the message using the receiver's private key.
  • • Encrypt the message using the sender's private key.
  • • Encrypt the message using the receiver's public key.
  • • Encrypt the message using the sender's public key.

Frage 120

Frage
120. Which of the following must be included on a digital certificate? I. The name of the entity and the expiration date II. The number of times the certificate has been viewed III. The digital signature of the certificate authority
Antworten
  • • II and III only
  • • I, and III
  • • I, II, and III
  • • I and II only

Frage 121

Frage
121. Encryption is used to
Antworten
  • • save storage space
  • • store data files in a vault
  • • protect privacy by encoding data
  • • archive system files

Frage 122

Frage
122. Of the following processes, which best characterizes the authentication process?
Antworten
  • • Logging into a secure site
  • • Verifying that software that is in use is not a pirated copy
  • • Authorizing use of some resource by a particular user
  • • Establishing a user identity

Frage 123

Frage
123. Which of the following is (are) true regarding computer network intrusion detection systems? I.They compare traffic against a database of known attack signatures.II. They can generate false alarms.
Antworten
  • • I only
  • • None
  • • II only
  • • I and II

Frage 124

Frage
124. The security of data can be violated through which of the following? I.Malicious acts II.User errors III.Disasters
Antworten
  • • II and III only
  • • I, II, and III
  • • I only
  • • I and III only

Frage 125

Frage
125. Which of the following is (are) true regarding computer security? I.Applying all available security measures may negatively impact system usability. II.Most intrusions result from exploitation of known vulnerabilities that remain unpatched.
Antworten
  • • None
  • • I and II
  • • II only
  • • I only

Frage 126

Frage
126. Good computer security practices include which of the following? I.Never shop online. II.Remove excess RAM from computers. III.Avoid sending email at night.
Antworten
  • • II and III only
  • • I and II only
  • • I, II, and III
  • • None

Frage 127

Frage
127. Examples of network monitoring tools include which of the following? I.Packet sniffers II.Antivirus software III.Security patches
Antworten
  • • I only
  • • I and III only
  • • II only
  • • I, II, and III

Frage 128

Frage
128. Which of the following is (are) true of anti-virus software? I.Typically, it scans both files and memory. II.It is ineffective unless it is updated frequently. III.It protects against network bandwidth attacks.
Antworten
  • • II only
  • • I and II only
  • • I, II, and III
  • • I and III only

Frage 129

Frage
129. Which of the following is (are) important to ensuring computer security? I.Keep applications and operating system updated with the latest security patches. II.Replace motherboard batteries regularly. III.Use firewalls
Antworten
  • • III only
  • • I, II, and III
  • • I and III only
  • • II and III only

Frage 130

Frage
130. Which of the following statements is (are) true about smart cards? I.They are vulnerable to Internet attacks. II.They can encrypt data.
Antworten
  • • II only
  • • None
  • • I and II
  • • I only

Frage 131

Frage
131. Which of the following is correct with respect to customers providing highly personal information across the Internet through electronic commerce transactions?
Antworten
  • 131. Which of the following is correct with respect to customers providing highly personal information across the Internet through electronic commerce transactions?
  • • Transactions are relatively secure between the consumer and a company's Web site if the data is encrypted.
  • • It is impossible for anybody to see the transaction on the Internet except for the intended Web site conducting the transaction.
  • • If a transaction is encrypted, any unauthorized parties intercepting the transaction will take ten or more years to decrypt the information.

Frage 132

Frage
132. Which of the following comparisons between public-key encryption schemes and private-key encryption schemes is true?
Antworten
  • • It takes longer to transmit encrypted data using private-key encryption schemes than public-key encryption schemes.
  • • It is easier to decrypt data using private-key encryption schemes than public-key encryption schemes.
  • • Private-key encryption schemes are more secure than public-key encryption schemes.
  • • Public-key encryption schemes involve more computations than private-key encryption schemes.

Frage 133

Frage
133. Which of the following is true about private-key encryption schemes?
Antworten
  • • The sender and the receiver have different private keys.
  • • The sender and the receiver use the same private key.
  • • The sender and the receiver have two private keys, one for encryption and one for decryption.
  • • The sender must notify the receiver before sending a message.

Frage 134

Frage
134. Which of the following is (are) true regarding network monitoring tools? I. They should only be installed in a single location on a network. II. Monitoring only needs to be done when a problem is suspected.
Antworten
  • • None
  • • I and II
  • • II only
  • • I only

Frage 135

Frage
135. Anti-virus software with updated virus definitions typically protects against which of the following? I. Worms II. Trojan horse programs
Antworten
  • • I only
  • • None
  • • I and II
  • • II only

Frage 136

Frage
136. Which of the following path formats can be used to specify the value of the href attribute of the<xmp><a></xmp> tag? I. An absolute path II. A relative path
Antworten
  • • I and II
  • • I only
  • • None
  • • II only

Frage 137

Frage
137. ANSI stands for
Antworten
  • • All National Standard of Information
  • • American National System Information
  • • American National Standards Institute √
  • • All National Standards Institute

Frage 138

Frage
138. _________ receives input from the user and processes this input through the computer to produce output.
Antworten
  • • Hardware
  • • Software
  • • Computer system
  • • Network system

Frage 139

Frage
139. ________________is the delay between the time when the memory device receives an address and the time when the first bit of data is available from the memory device.
Antworten
  • • Latency
  • • RAM
  • • Capacity
  • • DRAM

Frage 140

Frage
140. Who designed a general-purpose calculating device, the Analytical Engine?
Antworten
  • • Augusta Ada King
  • • Gordon Moore
  • • Jack Kilby
  • • Charles Babbage

Frage 141

Frage
141. PCI stands for
Antworten
  • • Peripheral Component Interconnect
  • • Peripheral Computer Internet
  • • Peripheral Component Interaction
  • • Peripheral Computer Interaction

Frage 142

Frage
141.1. Convert the binary number 01011 to decimal
Antworten
  • • 11
  • • 110
  • • 1011
  • • 10

Frage 143

Frage
142. Convert the decimal number 63 to binary
Antworten
  • • 111111
  • • 110111
  • • 0110111
  • • 11011111

Frage 144

Frage
143. Convert the hexadecimal text D9 to binary
Antworten
  • • 1101 1001
  • • 1010 0111
  • • 1110 0100
  • • 1110 1101

Frage 145

Frage
144. Convert this binary number 010101 to decimal
Antworten
  • • 21
  • • 20
  • • 25
  • • 22

Frage 146

Frage
145. Convert this hexadecimal number 8F to decimal
Antworten
  • • 143
  • • 142
  • • 141
  • • 140

Frage 147

Frage
146. Convert this decimal number 125 to binary
Antworten
  • • 1111101
  • • 1101011
  • • 1111011
  • • 1101001

Frage 148

Frage
147. Convert this hexadecimal number A3 to binary
Antworten
  • • 1010 0011
  • • 0110 1111
  • • 0110 1100
  • • 0111 1111

Frage 149

Frage
148. Convert this decimal number 117 to hexadecimal
Antworten
  • • 75
  • • 0111 1111
  • • 85
  • • 0110 1111

Frage 150

Frage
150. Convert this binary number 10001001 to hexadecimal
Antworten
  • • 89h
  • • 99a
  • • 0111 0111
  • • 89

Frage 151

Frage
151. Match the different types of buses
Antworten
  • Front side bus Bus on the motherboard that transfers data between the CPU and the chipset
  • PCI Predominant bus for newer systems
  • AGP Very fast, running at 66 MHz with a 32-bit word size, and transferring 266 MBps
  • IDE bus Transfers data between storage devices and the chipset
  • USB Not rated with a MHz speed; rated by peak transfer rate
  • FireWire High transfer rate designed for high-speed external peripherals such as DVD-ROM and hard disk drives

Frage 152

Frage
152. This means that each layer needs only a limited amount of knowledge to do its job
Antworten
  • • Encapsulation
  • • Abstraction
  • • Deduction
  • • E-learning

Frage 153

Frage
153. What is the use of a range of modern information and technologies by government to improve efficiency, service etc. i.e. Internet,mobile,local area network?
Antworten
  • • E-Commerce
  • • E-Learning
  • • E-Governance
  • • E-Bussiness

Frage 154

Frage
154. What is referring to data in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign?
Antworten
  • • Cryptographic
  • • Electronic signature
  • • Telegraph signatures
  • • Faxed signatures

Frage 155

Frage
155. Components of a Multimedia System (match them with their examples):
Antworten
  • Capture devices Video Camera, Video Recorder, Audio Microphone, Keyboards, mice, graphics tablets, 3D input devices, tactile sensors, VR devices. Digitising/Sampling Hardware
  • Storage Devices Hard disks, CD-ROMs, Jaz/Zip drives, DVD
  • Communication Networks Ethernet, Token Ring, FDDI, ATM, Intranets, Internets
  • Computer Systems Multimedia Desktop machines, Workstations, MPEG/VIDEO/DSP Hardware
  • Display Devices CD-quality speakers, HDTV,SVGA, Hi-Resolution monitors, Color printers

Frage 156

Frage
156. _____________provides us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online.
Antworten
  • • Cloud computing
  • • E-commerce
  • • E-learning
  • • Data centers

Frage 157

Frage
157. What is a term for all types of technology-enhanced learning (TEL), where technology is used to support the learning process?
Antworten
  • • Cloud computing
  • • E-commerce
  • • E-learning
  • • Data centers

Frage 158

Frage
158. Match the types of E-Commerce
Antworten
  • Business-to-Business(B-to-B) Is a website that is dedicated to exchange of information, goods and services to other business rather than final consumers.
  • Business-to-Customer(B-to-C) Is a website where all transactions take place between a business house and the final consumer
  • Consumers-to-businesses (C2B) Consumers make known a particular need for a product or service, and suppliers compete to provide the product or service to consumers.
  • Consumer-to-consumer Is a website where all the transactions take place between a consumer and the website acting asa platform that brings the buyer and the seller together

Frage 159

Frage
159. Match the Layers of software 1 2 3 4 5 6 7 8 9 10
Antworten
  • User-Written Scripts
  • User Interface
  • Application
  • Run-time Library
  • Application Program Interface
  • Operating System
  • Kernel
  • Device Drivers
  • BIOS
  • Hardware

Frage 160

Frage
160. Match the definitions of the types of the interfaces
Antworten
  • Command line interface the user types a command on the keyboard, the computer executes the command and provides textual output
  • Graphical user interface uses windows, icons, menus and pointers (WIMP) which can be manipulated by a mouse (and often to an extent by a keyboard as well).

Frage 161

Frage
161. What is a continuous representation, analogous to the actual information it represents?
Antworten
  • • Analog data
  • • Data
  • • Information
  • • Knowledge

Frage 162

Frage
162. What is the technology that uses computing with high speed communication links to spread information from one place to another
Antworten
  • • Information technology
  • • Data
  • • Knowledge
  • • Computing systems

Frage 163

Frage
163. _______are complex devices, dealing with a vast array of information categories
Antworten
  • • Information
  • • Data
  • • Knowledge
  • • Computing systems

Frage 164

Frage
164. In cryptography, what is cipher? I. algorithm for performing encryption and decryption II. encrypted message
Antworten
  • • Only I
  • • Only II
  • • Both I and II
  • • None

Frage 165

Frage
165. In asymmetric key cryptography, the private key is kept by
Antworten
  • • Sender
  • • Receiver
  • • Sender and receiver
  • • All connected devices to the network

Frage 166

Frage
166. ____________is a set of computer instructions or data.
Antworten
  • • Software
  • • Hardware
  • • Disk drive
  • • Memory

Frage 167

Frage
167. What provides connections among computers to enable computers to share data (e.g. documents), hardware (e.g. printers), and software resources (e.g. application programs)?
Antworten
  • • Drivers
  • • CPU
  • • Network
  • • Memory

Frage 168

Frage
168. What is the IDE (Integrated Drive Electronics) cable
Antworten
  • • Rolls data flow among component
  • • Transfers data from storage devices to the motherboard
  • • Stores data permanently
  • • Serves as a socket on the motherboard

Frage 169

Frage
169. What allow users to automate sequences of actions they perform frequently?
Antworten
  • • Script
  • • Macros
  • • Script and macros
  • • None

Frage 170

Frage
170. What is the Trap?
Antworten
  • • An event triggered by an external signal
  • • Keeps track of all the processes running
  • • Places the byte in a storage area
  • • A signal informing a program that an event has occurred

Frage 171

Frage
171. _________ is the rapid display of a sequence of images of 2-D or 3-D artwork or model positions in order to create an illusion of movement.
Antworten
  • • Text
  • • Animation
  • • Video conferencing
  • • Picture

Frage 172

Frage
172. How we call the process, when each user has a single view of the available resources, independently of how they are arranged in terms of physical devices?
Antworten
  • • Scalability
  • • Elasticity
  • • Virtualization
  • • Lower Infrastructure Costs

Frage 173

Frage
173. Indicate working models for cloud computing:
Antworten
  • • Deployment models only
  • • Deployment and Service Models
  • • Service models only
  • • None

Frage 174

Frage
174. Which of the following cloud deployment models allows systems and services to be accessible within an organization?
Antworten
  • • Public Cloud
  • • Community Cloud
  • • Private Cloud
  • • None

Frage 175

Frage
175. What are the Service Models?
Antworten
  • • They are the reference models on which the Cloud Computing is based
  • • They allow systems and services to be accessible by group of organizations
  • • They allow systems and services to be easily accessible to the general public
  • • None

Frage 176

Frage
176. What provides access to fundamental resources such as physical machines, virtual machines, virtual storage?
Antworten
  • • SaaS
  • • IaaS
  • • PaaS
  • • None

Frage 177

Frage
177. What provides the runtime environment for applications, development & deployment tools?
Antworten
  • • SaaS
  • • IaaS
  • • PaaS
  • • None

Frage 178

Frage
178. Which model allows using software applications as a service to end users?
Antworten
  • • SaaS
  • • IaaS
  • • PaaS
  • • None

Frage 179

Frage
179. What provides a uniform abstraction of the underlying physical machine?
Antworten
  • • Abstraction
  • • Virtualization
  • • Hypervision
  • • None

Frage 180

Frage
180. What has the same form as a URL but may not identify an actual location on the Internet?
Antworten
  • • URI
  • • URN
  • • URL
  • • DNS
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Networks
Will8324
General ICT Quiz
leahshaw
ICT Revison Flash Cards
Arun Johal
FLAT FILE VS RELATIONAL DATABASE
rosiejones
Online World - Learning Aim A
andysedge
Business Aims and ICT Strategies
scrt
User Interfaces
Skeletor
General ICT Quiz
Jade Fantom