"Hello Users, We offer Special Notes for UGC NET, DSSSB, PSSSB, RSMSSB, RPSSB, KVS NVS, and All State Librarian Exams. Our notes are available in both objective and subjective formats, prepared according to the latest patterns. You can purchase them from our website. If you have any queries, please contact us at billadhulka@gmail.com. Best Regards

The Ultimate Hacking and Spam Quiz Proven 101 Proven

STEPS TO ATTEMPT The Ultimate Hacking and Spam Quiz

  1. The total number of questions is 100+.
  2. Every question is given four options, one is right and three others are wrong answers.
  3. Choose the correct option and solve each question.
  4. The submit button is below the last question, after attempting all questions please click on the submit button.
  5. The final result is shown on the display screen, check your answers.
  6. If any queries regarding this quiz, Please comment on it.

Welcome to your The Ultimate Hacking and Spam Quiz Proven 100

1. 
In the right setting a thief will steal your information by simply watching what you type.

2. 
A___________is a small program embedded inside of a GIF image.

3. 
A hacker contacts you my phone or email and attempts to acquire your password.

4. 
A hacker that changes or forges information in an electronic resource, is engaging in__________?

5. 
Hackers often gain entry to a network be pretending to be at a legitimate computer.

6. 
The________of a threat measures potential impact on a system.

7. 
The power level drops below 120V.

8. 
Which of the following is NOT a Microsoft Internet tool or technology?

9. 
A protocol used to control the secure sending of data on the internet is :

10. 
Programs from the same developer sold bundled together, that provide better integration and share common features, toolbars and menus are known as ...........

11. 
...............terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

12. 
The OSI model is divided into_________processes called layers.

13. 
...........are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.

14. 
In a ring topology, the computer in possession of the.........can transmit data

15. 
............Viruses are often transmitted by a floppy disk left in the floppy drive.

16. 
A database management system (DBMS) is a________.

17. 
A Proxy server is used for which of the following?

18. 
__________are words that a programming language has set aside for its own use.

19. 
What is the primary difference between a virus and a worm?

20. 
__________describe what is database fields.

21. 
A goal of normalization is to________?

22. 
A(n).............uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.

23. 
Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is.

24. 
‘ITS’ stands for

25. 
Any piece of equipment forming an interface to a data communication system is.

26. 
In the language of the computer profession, one thousand position of main storage is represented with the letter

27. 
The control of the jobs running within a system is :

28. 
The total number of messages handled by a computerized telephone system on a daily basis is an example of :

29. 
A device mounted on a communication satellite which receives, amplifies and re- transmits signals from earth station is

30. 
What is the acronym for Single In-Line Memory Module?

31. 
Which type of processing that produces output results immediately after input data are entered into a computer system

32. 
A computer program that instructs other programs to perform a particular type of operation is :

33. 
The______provides a path between the CPU and peripheral devices, which are connected via interface cards

34. 
Programs prepared by an outside supplier & provided to a user in a machine readable form is known as

35. 
Pictures or drawings, typically displayed on a VDU to allow users to select program options is called

36. 
The pieces of equipment which are attached to the CPU of a computer and which it can access are called.

37. 
A factor which might cause an individual to consider using a computer in criminal activities is :

38. 
The Secure Electronic Transaction (SET) specification

39. 
‘DOS’ floppy disk does not have________

40. 
All the information collected during database development is stored in a_________

41. 
The............component is used by the data analyst to create the queries that access the database.

42. 
A polymorphic virus_______

43. 
Microwave transmission is used in environments where installing physical transmission media is_________

44. 
Which is NOT a good Web security strategy?

45. 
The word FTP stands for__________?

46. 
This............tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.

47. 
RSA is__________

48. 
A DVD-RAM is similar to ............except it has storage capacities upto 5.2 GB.

49. 
How is power supplied to a low-power USB device?

50. 
The.........data mining techniques derives rules from real-world case examples.

51. 
Which of the following objects is passed to a JavaBean when one of its properties is set via a JSP action?

52. 
Graphical diagrams used to represent different multiple perspectives of a system include_________.

53. 
Database redesign is not terribly difficult if the_________

54. 
Which of the following are normally used to initialize a computer system’s hardware?

55. 
If you wanted to locate the hardware address of a local device, which protocol would you use?

56. 
What is Internet 2 ?

57. 
While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?

58. 
Which kind of lock includes a keypad that can be used to control access into areas?

59. 
Which is not a factor when categorizing a computer?

60. 
Which of the following terms is the most closely related to main memory?

61. 
Which of the following is not a factor affecting the processing capability or performance of a PC system?

62. 
What is the standard code the computer industry created to represent characters?

63. 
Primary storage is...........as compared to secondary storage :

64. 
Offline device is :

65. 
The most popular language used with microcomputers and time-shared mini computers, is an easy-to-use high level language :

66. 
Which of the following is a communication network that is devoted to carrying computer information :

67. 
A half byte is known as :

68. 
With respect to a network interface card the term 10/100 refers to:

69. 
A hard disk is divided into tracks which are further subdivided into

70. 
Which standard govern parallel communications?

71. 
Which peripheral port provides the FASTEST throughput to laser printers?

72. 
Resistance is measured in ?

73. 
In Inkjet technology the droplets of ink are deflected by?

74. 
Which provides the fastest access to large video files?

75. 
Which provides the fastest access to large video files?

76. 
Primary memory stores :

77. 
You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first :

78. 
What’s the best way to protect your hard drive data?

79. 
Laser Jet printer speeds are measured in pages per minute (ppm) what do we use to measure dot-matrix printers?

80. 
A modem could be attached to which port?

81. 
You get a CMOS checksum error during bootup. What is most likely the cause?

82. 
What are the four key functions of a computer system?

83. 
Parity is :

84. 
What is different between AT and ATX power supplies?

85. 
What type of connector is used to plug a telephone line into a modem?

86. 
Which of the following is NOT a type of computer hard drive?

87. 
What does FDISK do?

88. 
Which of the following is NOT a type of motherboard expansion slot?

89. 
Copying a process from memory to disk to allow space for other processes is called :

90. 
Which of the following memory unit that processor can access more rapidly :

91. 
Which one of the following is not the function of Operating System?

92. 
What is the meaning of “Hibernate” in Windows XP/Windows7?

93. 
Unix Operating System is an :

94. 
What should be the extension to execute files?

95. 
Which of the following memories need refresh?

96. 
RJ45 UTP cable has.........Cable :

97. 
Basic is..........language :

98. 
The file system “NTFS” stands for :

99. 
Which Operating System doesn’t support networking between computers?

100. 
In which type of the following OS, the response time is very crucial :

101. 
Which of the following languages is more suited to structured program?

Important Links The Ultimate Hacking and Spam Quiz

gyanmala library telegram
Join Free Telegram Job Alert Service
Youtube Library Institutional Resources MCQ
YouTube Channel Subscribe

Join Telegram and Subscribe YouTube Channel. Your Support is our Strength. The growth of Library Science is our Mission. The Ultimate Hacking and Spam Quiz

facebook
Facebook Page
Instagram The Ultimate Hacking and Spam Quiz
Instagram Page Follow

 

Scroll to Top