Deck 11: Technology Terminology and Concepts

ملء الشاشة (f)
exit full mode
سؤال
Broadband connections includes

A)cable
B)satellite
C)DSL
D)all of these
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
ICQ is related with

A)Weblogs
B)Instant messaging
C)Search engines
D)Podcasts
سؤال
CCTV is

A)Closed circuit television
B)Crime detection Software
C)Communication software
D)All the above
سؤال
Britannica is a

A)Free online educational software
B)Class room aid
C)Edutainment
D)None of these
سؤال
INFLIBNET is

A)Sharing of library and information resources
B)Free online education software
C)Software for sharing information
D)Online bio-resource in centre
سؤال
Google earth is --------

A)Entertainment software
B)Educational software
C)Anti- virus software
D)Hardware
سؤال
Which among shows IT for national integration

A)Permanent Account Number (PAN)
B)Electors Photo Identity Card (EPIC)
C)Sakshat and INFLIBNET
D)All of these.
سؤال
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

A)Free Software programme
B)Free Software development
C)Free Software Foundation
D)The open Source Initiative.
سؤال
------- can be referred as the use or application of computational devices in the field of biological sciences and research.

A)Bio-computing
B)Virtual Computing
C)Artificial Intelligent
D)DNA
سؤال
This unlawful acts wherein the computer is either a tool or target or both

A)Cyber ethics
B)Cyber crime
C)Cyber abuse
D)Cyber literacy
سؤال
Which of the following is annoying, but really doesn't render any harm to our computer?

A)Shareware
B)Malware
C)Spyware
D)Adware
سؤال
Why do you not want too much personal data about you on the Internet?

A)It might reveal embarrassing facts about you
B)It might be used by an identity thief to impersonate you
C)It might be used by a potential employer to find out more about you
D)There is no reason to worry about personal information on the Internet
سؤال
What is the top rule for avoiding Internet fraud?

A)If it seems too good to be true, it probably is
B)Never use your bank account numbers
C)Only work with people who have verifiable e-mail address
D)Do not invest in foreign deals
سؤال
One scam that lures internet users into revealing personal information is

A)Malware
B)Spam
C)Phishing
D)Internet hoax
سؤال
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

A)Zero-day Attack
B)Trojan Horse Attack
C)Distributed Denial of Service Attack
D)Boot Sector Virus Attack
سؤال
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

A)Worms
B)Stealth Viruses
C)Logic bombs
D)Macro viruses
سؤال
How could hacker use information about you found through Internet searches?

A)To guess passwords if your passwords are linked to personal
B)To guess passwords if your passwords are linked to your interests or hobbies
C)In social engineering, to ascertain more information about you or your computer system
D)All of the above
سؤال
What is the first step in protecting yourself from identity theft?

A)Never provide any personal data about yourself unless absolutely necessary
B)Routinely check your records for signs of identity theft.
C)Never use your real name on the Internet
D)Routinely check for spyware on your computer.
سؤال
A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?

A)Software that has some malicious purpose
B)Software that is not functioning properly
C)Software that damages your system
D)Software that is not properly configured for your system
سؤال
Which of the following is a step that all computer users should take to protect against virus attacks?

A)Purchase and configure a firewall
B)Shut down all incoming ports
C)Use non-standard e-mail clients
D)Install and use antivirus software
سؤال
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
سؤال
------ uses software to allow people to interact with three-dimensional simulated environment.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
سؤال
Computers are programmed to make decisions in real-life situations are known as

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
سؤال
Computing systems, which imitate human brain through a network of highly interconnected processing elements.

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Technology Terminology and Concepts
1
Broadband connections includes

A)cable
B)satellite
C)DSL
D)all of these
all of these
2
ICQ is related with

A)Weblogs
B)Instant messaging
C)Search engines
D)Podcasts
Instant messaging
3
CCTV is

A)Closed circuit television
B)Crime detection Software
C)Communication software
D)All the above
Closed circuit television
4
Britannica is a

A)Free online educational software
B)Class room aid
C)Edutainment
D)None of these
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
5
INFLIBNET is

A)Sharing of library and information resources
B)Free online education software
C)Software for sharing information
D)Online bio-resource in centre
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
6
Google earth is --------

A)Entertainment software
B)Educational software
C)Anti- virus software
D)Hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which among shows IT for national integration

A)Permanent Account Number (PAN)
B)Electors Photo Identity Card (EPIC)
C)Sakshat and INFLIBNET
D)All of these.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
8
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

A)Free Software programme
B)Free Software development
C)Free Software Foundation
D)The open Source Initiative.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
9
------- can be referred as the use or application of computational devices in the field of biological sciences and research.

A)Bio-computing
B)Virtual Computing
C)Artificial Intelligent
D)DNA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
10
This unlawful acts wherein the computer is either a tool or target or both

A)Cyber ethics
B)Cyber crime
C)Cyber abuse
D)Cyber literacy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is annoying, but really doesn't render any harm to our computer?

A)Shareware
B)Malware
C)Spyware
D)Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
12
Why do you not want too much personal data about you on the Internet?

A)It might reveal embarrassing facts about you
B)It might be used by an identity thief to impersonate you
C)It might be used by a potential employer to find out more about you
D)There is no reason to worry about personal information on the Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the top rule for avoiding Internet fraud?

A)If it seems too good to be true, it probably is
B)Never use your bank account numbers
C)Only work with people who have verifiable e-mail address
D)Do not invest in foreign deals
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
14
One scam that lures internet users into revealing personal information is

A)Malware
B)Spam
C)Phishing
D)Internet hoax
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
15
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

A)Zero-day Attack
B)Trojan Horse Attack
C)Distributed Denial of Service Attack
D)Boot Sector Virus Attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
16
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

A)Worms
B)Stealth Viruses
C)Logic bombs
D)Macro viruses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
17
How could hacker use information about you found through Internet searches?

A)To guess passwords if your passwords are linked to personal
B)To guess passwords if your passwords are linked to your interests or hobbies
C)In social engineering, to ascertain more information about you or your computer system
D)All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is the first step in protecting yourself from identity theft?

A)Never provide any personal data about yourself unless absolutely necessary
B)Routinely check your records for signs of identity theft.
C)Never use your real name on the Internet
D)Routinely check for spyware on your computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
19
A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?

A)Software that has some malicious purpose
B)Software that is not functioning properly
C)Software that damages your system
D)Software that is not properly configured for your system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is a step that all computer users should take to protect against virus attacks?

A)Purchase and configure a firewall
B)Shut down all incoming ports
C)Use non-standard e-mail clients
D)Install and use antivirus software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
21
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
22
------ uses software to allow people to interact with three-dimensional simulated environment.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
23
Computers are programmed to make decisions in real-life situations are known as

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
24
Computing systems, which imitate human brain through a network of highly interconnected processing elements.

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 24 في هذه المجموعة.