Computer Awareness SET-7 for IT officer

0
1897

Computer Awareness SET-7 for IT officer

Dear Friends with IT officer exams scheduled to take place in a couple of months we are here with our 1st sheet on computer study material for IT Officer.

Computer Knowledge Questions

Fill in the Blank:

1. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging
2. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime

3. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet

4. ____________ is the most common form of computer crime.
Answer: Theft

5. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft

6. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook

7. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy

8. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.
Answer: macro virus

9. Both viruses and ____________ use computer hosts to replicate.
Answer: worms

10. ____________ programs search for and eliminate viruses.
Answer: Antivirus

11. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.
Answer: nothing or free

12. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking

13. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking

14. DoS stands for ___________.
Answer: denial of service

15. DDoS stands for ___________.
Answer: distributed denial of service

16. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers

17. ___________ software monitors and records computer transactions.
Answer: Audit-control

18. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography

19. PGP stands for ___________.
Answer: Pretty Good Privacy

20. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID

21. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.
Answer: attachments

[do_widget text]