1.
Which computer virus records every movement you make on your computer?
a) Malware Android
b) Key logger
c) DoS
d) Trapper
e) None of these
Answer: (b)
2. What type of web technology allows its community members to continuously change the contents on a website?
a) Intelligent bots
b) Social networks
c) Wiki
d) Blog
e) None of these
Answer: (c)
3. What term refers to living life through technology?
a) Virtual living
b) E-living
c) Virtual space
d) E-Society
e) All of above
Answer: (d)
4. What is a common medium used for thieves to steal others' identities?
a) Telephone
b) Pick pocketing
c) Burglary
d) Email
e) none of these
Answer: (d)
5. What is it called when you are rerouted from your requested internet site to another, undesired site?
a) Phishing
b) Pharming
c) Redirecting
d) Hijacking
e) None of these
Answer: (b)
6. When there is little or no exchange of information within an organization's information systems, we say that the systems are ?
a) independent
b) autonomous
c) self-sufficient
d) decentralized
e) None of these
Answer: (d)
7. Who is the person who typically manages the software development project?
a) Software engineer
b) Project manager
c) IT manager
d) Technology director
e) All the above
Answer: (b)
8. In which phase of the software design and development project would you try to understand the proposed project?
a) Planning phase
b) Initial phase
c) Requirements phase
d) Analysis phase
e) None of these
Answer: (d)
9. What type of technology scrambles the contents of files sent via the Internet?
a) Encryption
b) Secured data interchange
c) Cryptogram
d) Regulated code
e) None of these
Answer: (a)
10. Which of the following systems helps you with making a decision about a non-structured problem?
a) Artificial intelligence
b) Neural network
c) Genetic algorithm
d) Decision support system
e) None of these
a) Malware Android
b) Key logger
c) DoS
d) Trapper
e) None of these
Answer: (b)
2. What type of web technology allows its community members to continuously change the contents on a website?
a) Intelligent bots
b) Social networks
c) Wiki
d) Blog
e) None of these
Answer: (c)
3. What term refers to living life through technology?
a) Virtual living
b) E-living
c) Virtual space
d) E-Society
e) All of above
Answer: (d)
4. What is a common medium used for thieves to steal others' identities?
a) Telephone
b) Pick pocketing
c) Burglary
d) Email
e) none of these
Answer: (d)
5. What is it called when you are rerouted from your requested internet site to another, undesired site?
a) Phishing
b) Pharming
c) Redirecting
d) Hijacking
e) None of these
Answer: (b)
6. When there is little or no exchange of information within an organization's information systems, we say that the systems are ?
a) independent
b) autonomous
c) self-sufficient
d) decentralized
e) None of these
Answer: (d)
7. Who is the person who typically manages the software development project?
a) Software engineer
b) Project manager
c) IT manager
d) Technology director
e) All the above
Answer: (b)
8. In which phase of the software design and development project would you try to understand the proposed project?
a) Planning phase
b) Initial phase
c) Requirements phase
d) Analysis phase
e) None of these
Answer: (d)
9. What type of technology scrambles the contents of files sent via the Internet?
a) Encryption
b) Secured data interchange
c) Cryptogram
d) Regulated code
e) None of these
Answer: (a)
10. Which of the following systems helps you with making a decision about a non-structured problem?
a) Artificial intelligence
b) Neural network
c) Genetic algorithm
d) Decision support system
e) None of these
Answer: (d)
No comments:
Post a Comment