Deck 11: Technology Terminology and Concepts

Full screen (f)
exit full mode
Question
Broadband connections includes

A)cable
B)satellite
C)DSL
D)all of these
Use Space or
up arrow
down arrow
to flip the card.
Question
ICQ is related with

A)Weblogs
B)Instant messaging
C)Search engines
D)Podcasts
Question
CCTV is

A)Closed circuit television
B)Crime detection Software
C)Communication software
D)All the above
Question
Britannica is a

A)Free online educational software
B)Class room aid
C)Edutainment
D)None of these
Question
INFLIBNET is

A)Sharing of library and information resources
B)Free online education software
C)Software for sharing information
D)Online bio-resource in centre
Question
Google earth is --------

A)Entertainment software
B)Educational software
C)Anti- virus software
D)Hardware
Question
Which among shows IT for national integration

A)Permanent Account Number (PAN)
B)Electors Photo Identity Card (EPIC)
C)Sakshat and INFLIBNET
D)All of these.
Question
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

A)Free Software programme
B)Free Software development
C)Free Software Foundation
D)The open Source Initiative.
Question
------- can be referred as the use or application of computational devices in the field of biological sciences and research.

A)Bio-computing
B)Virtual Computing
C)Artificial Intelligent
D)DNA
Question
This unlawful acts wherein the computer is either a tool or target or both

A)Cyber ethics
B)Cyber crime
C)Cyber abuse
D)Cyber literacy
Question
Which of the following is annoying, but really doesn't render any harm to our computer?

A)Shareware
B)Malware
C)Spyware
D)Adware
Question
Why do you not want too much personal data about you on the Internet?

A)It might reveal embarrassing facts about you
B)It might be used by an identity thief to impersonate you
C)It might be used by a potential employer to find out more about you
D)There is no reason to worry about personal information on the Internet
Question
What is the top rule for avoiding Internet fraud?

A)If it seems too good to be true, it probably is
B)Never use your bank account numbers
C)Only work with people who have verifiable e-mail address
D)Do not invest in foreign deals
Question
One scam that lures internet users into revealing personal information is

A)Malware
B)Spam
C)Phishing
D)Internet hoax
Question
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

A)Zero-day Attack
B)Trojan Horse Attack
C)Distributed Denial of Service Attack
D)Boot Sector Virus Attack
Question
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

A)Worms
B)Stealth Viruses
C)Logic bombs
D)Macro viruses
Question
How could hacker use information about you found through Internet searches?

A)To guess passwords if your passwords are linked to personal
B)To guess passwords if your passwords are linked to your interests or hobbies
C)In social engineering, to ascertain more information about you or your computer system
D)All of the above
Question
What is the first step in protecting yourself from identity theft?

A)Never provide any personal data about yourself unless absolutely necessary
B)Routinely check your records for signs of identity theft.
C)Never use your real name on the Internet
D)Routinely check for spyware on your computer.
Question
A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?

A)Software that has some malicious purpose
B)Software that is not functioning properly
C)Software that damages your system
D)Software that is not properly configured for your system
Question
Which of the following is a step that all computer users should take to protect against virus attacks?

A)Purchase and configure a firewall
B)Shut down all incoming ports
C)Use non-standard e-mail clients
D)Install and use antivirus software
Question
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
Question
------ uses software to allow people to interact with three-dimensional simulated environment.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
Question
Computers are programmed to make decisions in real-life situations are known as

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
Question
Computing systems, which imitate human brain through a network of highly interconnected processing elements.

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/24
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Technology Terminology and Concepts
1
Broadband connections includes

A)cable
B)satellite
C)DSL
D)all of these
all of these
2
ICQ is related with

A)Weblogs
B)Instant messaging
C)Search engines
D)Podcasts
Instant messaging
3
CCTV is

A)Closed circuit television
B)Crime detection Software
C)Communication software
D)All the above
Closed circuit television
4
Britannica is a

A)Free online educational software
B)Class room aid
C)Edutainment
D)None of these
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
5
INFLIBNET is

A)Sharing of library and information resources
B)Free online education software
C)Software for sharing information
D)Online bio-resource in centre
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
6
Google earth is --------

A)Entertainment software
B)Educational software
C)Anti- virus software
D)Hardware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
7
Which among shows IT for national integration

A)Permanent Account Number (PAN)
B)Electors Photo Identity Card (EPIC)
C)Sakshat and INFLIBNET
D)All of these.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
8
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

A)Free Software programme
B)Free Software development
C)Free Software Foundation
D)The open Source Initiative.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
9
------- can be referred as the use or application of computational devices in the field of biological sciences and research.

A)Bio-computing
B)Virtual Computing
C)Artificial Intelligent
D)DNA
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
10
This unlawful acts wherein the computer is either a tool or target or both

A)Cyber ethics
B)Cyber crime
C)Cyber abuse
D)Cyber literacy
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is annoying, but really doesn't render any harm to our computer?

A)Shareware
B)Malware
C)Spyware
D)Adware
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
12
Why do you not want too much personal data about you on the Internet?

A)It might reveal embarrassing facts about you
B)It might be used by an identity thief to impersonate you
C)It might be used by a potential employer to find out more about you
D)There is no reason to worry about personal information on the Internet
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
13
What is the top rule for avoiding Internet fraud?

A)If it seems too good to be true, it probably is
B)Never use your bank account numbers
C)Only work with people who have verifiable e-mail address
D)Do not invest in foreign deals
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
14
One scam that lures internet users into revealing personal information is

A)Malware
B)Spam
C)Phishing
D)Internet hoax
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
15
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

A)Zero-day Attack
B)Trojan Horse Attack
C)Distributed Denial of Service Attack
D)Boot Sector Virus Attack
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
16
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

A)Worms
B)Stealth Viruses
C)Logic bombs
D)Macro viruses
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
17
How could hacker use information about you found through Internet searches?

A)To guess passwords if your passwords are linked to personal
B)To guess passwords if your passwords are linked to your interests or hobbies
C)In social engineering, to ascertain more information about you or your computer system
D)All of the above
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
18
What is the first step in protecting yourself from identity theft?

A)Never provide any personal data about yourself unless absolutely necessary
B)Routinely check your records for signs of identity theft.
C)Never use your real name on the Internet
D)Routinely check for spyware on your computer.
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
19
A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?

A)Software that has some malicious purpose
B)Software that is not functioning properly
C)Software that damages your system
D)Software that is not properly configured for your system
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is a step that all computer users should take to protect against virus attacks?

A)Purchase and configure a firewall
B)Shut down all incoming ports
C)Use non-standard e-mail clients
D)Install and use antivirus software
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
21
-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
22
------ uses software to allow people to interact with three-dimensional simulated environment.

A)Virtual Computing
B)Artificial Intelligent
C)Bio-computing
D)Cookies
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
23
Computers are programmed to make decisions in real-life situations are known as

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
24
Computing systems, which imitate human brain through a network of highly interconnected processing elements.

A)Virtual reality
B)Robotics
C)Neural Networks
D)Expert System
Unlock Deck
Unlock for access to all 24 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 24 flashcards in this deck.