Computer Awareness SET-7 for IT officer
Dear Friends with IT officer exams scheduled to take place in a couple of months we are here with our 1st sheet on computer study material for IT Officer.
Computer Knowledge Questions
Fill in the Blank:
1. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging
2. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime
3. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet
4. ____________ is the most common form of computer crime.
Answer: Theft
5. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft
6. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook
7. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy
8. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.
Answer: macro virus
9. Both viruses and ____________ use computer hosts to replicate.
Answer: worms
10. ____________ programs search for and eliminate viruses.
Answer: Antivirus
11. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.
Answer: nothing or free
12. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking
13. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking
14. DoS stands for ___________.
Answer: denial of service
15. DDoS stands for ___________.
Answer: distributed denial of service
16. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers
17. ___________ software monitors and records computer transactions.
Answer: Audit-control
18. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography
19. PGP stands for ___________.
Answer: Pretty Good Privacy
20. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID
21. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.
Answer: attachments
[do_widget text]