Computer Awareness SET-7 for IT officer

Computer Awareness SET-7 for IT officer

Dear Friends with IT officer exams scheduled to take place in a couple of months we are here with our 1st sheet on computer study material for IT Officer.

Computer Knowledge Questions

Fill in the Blank:

1. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging
2. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime

3. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet

4. ____________ is the most common form of computer crime.
Answer: Theft

5. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft

6. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook

7. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy

8. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.
Answer: macro virus

9. Both viruses and ____________ use computer hosts to replicate.
Answer: worms

10. ____________ programs search for and eliminate viruses.
Answer: Antivirus

11. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.
Answer: nothing or free

12. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking

13. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking

14. DoS stands for ___________.
Answer: denial of service

15. DDoS stands for ___________.
Answer: distributed denial of service

16. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers

17. ___________ software monitors and records computer transactions.
Answer: Audit-control

18. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography

19. PGP stands for ___________.
Answer: Pretty Good Privacy

20. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID

21. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.
Answer: attachments

[do_widget text]

sehpaathi

Disqus Comments Loading...

Recent Posts

Marine Collagen and Biotin: The Dynamic Duo for Healthy Skin, Hair, and Nails

In the quest for glowing skin, luscious hair, and strong nails, the combination of marine…

3 months ago

Dive into Marine Collagen: Your Ultimate Guide to Youthful Skin, Strong Joints, and Radiant Hair

In the world of wellness and beauty, marine collagen has emerged as a potent supplement…

4 months ago

Why Orange Flavor Creatine is the Perfect Addition to Your Workout Routine

Creatine has long been a staple in the world of fitness and bodybuilding. Known for…

4 months ago

Learn All About Collagen and the Best Collagen Supplements

Collagen supplements have gained immense popularity, both online and offline, becoming a staple in many…

4 months ago

5 Best Supplements to Include in Your Fitness Routine

As the New Year approaches, many people resolve to get fit, but as time goes…

4 months ago

Top 10 Perfume Brands for Men in India

Luxury fragrances are appreciated for their natural notes derived from flowers, spices, and other natural…

5 months ago