Computer Awareness SET-7 for IT officer

Computer Awareness SET-7 for IT officer

Dear Friends with IT officer exams scheduled to take place in a couple of months we are here with our 1st sheet on computer study material for IT Officer.

Computer Knowledge Questions

Fill in the Blank:

1. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging
2. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime

3. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet

4. ____________ is the most common form of computer crime.
Answer: Theft

5. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft

6. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook

7. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy

8. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.
Answer: macro virus

9. Both viruses and ____________ use computer hosts to replicate.
Answer: worms

10. ____________ programs search for and eliminate viruses.
Answer: Antivirus

11. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.
Answer: nothing or free

12. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking

13. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking

14. DoS stands for ___________.
Answer: denial of service

15. DDoS stands for ___________.
Answer: distributed denial of service

16. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers

17. ___________ software monitors and records computer transactions.
Answer: Audit-control

18. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography

19. PGP stands for ___________.
Answer: Pretty Good Privacy

20. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID

21. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.
Answer: attachments

[do_widget text]

sehpaathi

Disqus Comments Loading...

Recent Posts

Current Affairs For 19th & 20th November 2023

Hola! If you haven't heard this quote yet, take a moment to read it here.…

5 months ago

Current Affairs For 18th November 2023

"Think good an good follows. Think evil and evil follows. Think creative and creativity will…

6 months ago

Current Affairs For 17th November 2023

Better late than never! Apologies for the delay in responding, but I'm here now to…

6 months ago

Current Affairs For 27th October 2023

By providing accurate information, context, promoting critical thinking, raising awareness, connecting global and local issues,…

6 months ago

Current Affairs For 25th & 26th October 2023

Current affairs coverage often showcases stories of individuals and communities making a positive impact. Q1.…

6 months ago

Current Affairs For 24th October 2023

Current affairs coverage helps individuals understand the interconnectedness of global and local events. It shows…

6 months ago