(a) An e-mail with attachment
(b) A plain text mail
(c) Downloading files over the web
(d) A per drive use
(e) None of these
2. Which of the following is not a virus ?
(a) Blaster
(b) Creeper
(c) Mellisa
(d) Kaspersky
(e) none of these
3. Unwanted repetitious messages, such as unsolicited bulk e-mails is known as.
(a) Spam
(b) Trash
(c) Calibri
(d) Courier
(e) None of these
4. Le-Hard virus is effect of a ________________.
(a) Command.com
(b) Hardware
(c) Software
(d) Application
(e) None of these
5. Which of the following is not a popular Anti-Virus software ?
(a) Kaspersky
(b) Symantec
(c) Trend Micro
(d) Blaster
(e) None of these
6. A result of a computer Virus can not lead to.
(a) Disk Crash
(b) Mother Board crash
(c) Corruption
(d) Deletion of files
(e) None of these
7. All of the following are example of real security and privacy risks except.
(a) Hackers
(b) Spam
(c) Viruses
(d) Identify theft
(e) None of these
8. Which of the following is a popular Dos based spread Sheet ?
(a) Excel
(b) Word
(c) Smart cell
(d) Lotus 1-2-3
(e) None of these
9. Eithernet, LAN, Token Ring, and token Bus are types of _______________.
(a) WAN
(b) Communication channels
(c) LAN
(d) Physical Medium
(e) None of these
10. An e-mail account includes a storage area, often called a ____________________.
(a) Attachment
(b) Hyperlink
(c) Mailbox
(d) IP address
(e) None of these
11. What is the name of the software that allows us to browse through web pages called ?
(a) Browser
(b) Mail client
(c) FTP client
(d) Messenger
(e) None of these
12. Most world wide web pages contain commands in the language ______________.
(a) NIH
(b) URL
(c) HTML
(d) IRC
(e) None of these
13. Fire walls are used to protect against
(a) Un authorised Attacks
(b) Virus Attacks
(c) Data Driver Attacks
(d) Fire Attacks
(e) None of these
14. "Trend Micro" is a ______________?
(a) Virus program
(b) Anti virus program
(c) Application
(d) All of the above
(e) None of these
15. The most important powerful computer in a typical network is ______________.
(a) Desktop
(b) Network Client
(c) Network Server
(d) Network Station
(e) None of these
Answers
1. A plain text mail
2. Kaspersky
3. Spam
4. Command.com
5. Blaster
6. Mother Board crash
7. Spam
8. Lotus 1-2-3
9. LAN
10. Mailbox
11. Browser
12. HTML
13. Virus Attacks
14. Anti virus program