Exercise & Quiz Test – 24


Question 1

1. A hacker that changes or forges information in an electronic resource, is engaging in __________.
1) denial of service
2) sniffing
3) terrorism
4) data diddling
5) None of these

Answer & Solution
Question 2

2. Software, such as Explorer and Firefox, are referred to as ______.
1) internet tools
2) Utility software
3) Development software
4) Browsers
5) None of these

Answer & Solution
Question 3

3. When two companies are linked together by computers and they send business transactions through these computers, they are probably using ______.
1) Digital wallets
2) Electronic data interchange
3) B2C
4) Smart cards
5) None of these.

Answer & Solution
Question 4

4. What term refers to your ability to connect to the internet and your company from a wireless device?
1) Net services
2) Push technology
3) Pull technology
4) Mobile computing
5) None of these

Answer & Solution
Question 5

5. Which of the following systems mimics human thinking?
1) Artificial intelligence
2) Intelligent agent
3) Bot
4) Database management system
5) All the above

Answer & Solution
Question 6

6. What database key uniquely identifies a record within a table?
1) Primary key
2) Foreign key
3) Secondary key
4) Relational key
5) None of these

Answer & Solution
Question 7

7. What database key links one table to another?
1) Primary key
2) Foreign key
3) Secondary key
4) Relational key
5) None of these

Answer & Solution
Question 8

8. Which device can understand difference between data & programs?
1) Input device
2) Output device
3) Memory
4) Microprocessor
5) None of these

Answer & Solution
Question 9

9. Algorithm and Flow chart help us to__________.
1) Know the memory capacity
2) Memory address register
3) Direct the output to a printer
4) Memory access register
5) None of these

Answer & Solution

10. A hacker contacts you my phone or email and attempts to acquire your password________.
1) spoofing
2) phishing
3) spamming
4) bugging
5) None of these

Answer & Solution