Deck 11: Technology Terminology and Concepts
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
Play
Full screen (f)
Deck 11: Technology Terminology and Concepts
1
Broadband connections includes
A)cable
B)satellite
C)DSL
D)all of these
A)cable
B)satellite
C)DSL
D)all of these
all of these
2
ICQ is related with
A)Weblogs
B)Instant messaging
C)Search engines
D)Podcasts
A)Weblogs
B)Instant messaging
C)Search engines
D)Podcasts
Instant messaging
3
CCTV is
A)Closed circuit television
B)Crime detection Software
C)Communication software
D)All the above
A)Closed circuit television
B)Crime detection Software
C)Communication software
D)All the above
Closed circuit television
4
Britannica is a
A)Free online educational software
B)Class room aid
C)Edutainment
D)None of these
A)Free online educational software
B)Class room aid
C)Edutainment
D)None of these
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
INFLIBNET is
A)Sharing of library and information resources
B)Free online education software
C)Software for sharing information
D)Online bio-resource in centre
A)Sharing of library and information resources
B)Free online education software
C)Software for sharing information
D)Online bio-resource in centre
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Google earth is --------
A)Entertainment software
B)Educational software
C)Anti- virus software
D)Hardware
A)Entertainment software
B)Educational software
C)Anti- virus software
D)Hardware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Which among shows IT for national integration
A)Permanent Account Number (PAN)
B)Electors Photo Identity Card (EPIC)
C)Sakshat and INFLIBNET
D)All of these.
A)Permanent Account Number (PAN)
B)Electors Photo Identity Card (EPIC)
C)Sakshat and INFLIBNET
D)All of these.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.
A)Free Software programme
B)Free Software development
C)Free Software Foundation
D)The open Source Initiative.
A)Free Software programme
B)Free Software development
C)Free Software Foundation
D)The open Source Initiative.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
------- can be referred as the use or application of computational devices in the field of biological sciences and research.
A)Bio-computing
B)Virtual Computing
C)Artificial Intelligent
D)DNA
A)Bio-computing
B)Virtual Computing
C)Artificial Intelligent
D)DNA
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
This unlawful acts wherein the computer is either a tool or target or both
A)Cyber ethics
B)Cyber crime
C)Cyber abuse
D)Cyber literacy
A)Cyber ethics
B)Cyber crime
C)Cyber abuse
D)Cyber literacy
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is annoying, but really doesn't render any harm to our computer?
A)Shareware
B)Malware
C)Spyware
D)Adware
A)Shareware
B)Malware
C)Spyware
D)Adware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
Why do you not want too much personal data about you on the Internet?
A)It might reveal embarrassing facts about you
B)It might be used by an identity thief to impersonate you
C)It might be used by a potential employer to find out more about you
D)There is no reason to worry about personal information on the Internet
A)It might reveal embarrassing facts about you
B)It might be used by an identity thief to impersonate you
C)It might be used by a potential employer to find out more about you
D)There is no reason to worry about personal information on the Internet
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
What is the top rule for avoiding Internet fraud?
A)If it seems too good to be true, it probably is
B)Never use your bank account numbers
C)Only work with people who have verifiable e-mail address
D)Do not invest in foreign deals
A)If it seems too good to be true, it probably is
B)Never use your bank account numbers
C)Only work with people who have verifiable e-mail address
D)Do not invest in foreign deals
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
One scam that lures internet users into revealing personal information is
A)Malware
B)Spam
C)Phishing
D)Internet hoax
A)Malware
B)Spam
C)Phishing
D)Internet hoax
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)
A)Zero-day Attack
B)Trojan Horse Attack
C)Distributed Denial of Service Attack
D)Boot Sector Virus Attack
A)Zero-day Attack
B)Trojan Horse Attack
C)Distributed Denial of Service Attack
D)Boot Sector Virus Attack
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called
A)Worms
B)Stealth Viruses
C)Logic bombs
D)Macro viruses
A)Worms
B)Stealth Viruses
C)Logic bombs
D)Macro viruses
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
How could hacker use information about you found through Internet searches?
A)To guess passwords if your passwords are linked to personal
B)To guess passwords if your passwords are linked to your interests or hobbies
C)In social engineering, to ascertain more information about you or your computer system
D)All of the above
A)To guess passwords if your passwords are linked to personal
B)To guess passwords if your passwords are linked to your interests or hobbies
C)In social engineering, to ascertain more information about you or your computer system
D)All of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
What is the first step in protecting yourself from identity theft?
A)Never provide any personal data about yourself unless absolutely necessary
B)Routinely check your records for signs of identity theft.
C)Never use your real name on the Internet
D)Routinely check for spyware on your computer.
A)Never provide any personal data about yourself unless absolutely necessary
B)Routinely check your records for signs of identity theft.
C)Never use your real name on the Internet
D)Routinely check for spyware on your computer.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?
A)Software that has some malicious purpose
B)Software that is not functioning properly
C)Software that damages your system
D)Software that is not properly configured for your system
A)Software that has some malicious purpose
B)Software that is not functioning properly
C)Software that damages your system
D)Software that is not properly configured for your system
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is a step that all computer users should take to protect against virus attacks?
A)Purchase and configure a firewall
B)Shut down all incoming ports
C)Use non-standard e-mail clients
D)Install and use antivirus software
A)Purchase and configure a firewall
B)Shut down all incoming ports
C)Use non-standard e-mail clients
D)Install and use antivirus software
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.
A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
------ uses software to allow people to interact with three-dimensional simulated environment.
A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
Computers are programmed to make decisions in real-life situations are known as
A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Computing systems, which imitate human brain through a network of highly interconnected processing elements.
A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck