Global MCQ Practice

🌐 Total MCQ
🏠 Homepage 📘 Download PDF Books 📕 Premium PDF Books

Computer Fundamentals Quiz 8 (25 MCQs)

Quiz Instructions:

Select an option to see the correct answer instantly.

1. This is someone who uses a computer to gain illegal access to other computer systems, and files, usually through the use of telecommunications
2. A printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
3. The Param was developed in which place??
4. Which windows function returns windows to a previous date?
5. Which of the following is the best description of a protocol in a telecommunications network architecture?
6. Collaboration Software is software that _____
7. A computer program that is designed to cause malfunctioning of a computer or damage the data stored on the computer.
8. This scam redirects you to a different but malicious website that looks just like the website you thought you were accessing.
9. Which program would you use for making a business presentation?
10. You can demand that your data is not used for
11. Which of these is the correct format of an IP Address
12. _____ holds your data for later
13. A _____ describes a potentially damaging computer program that affects a computer negatively.
14. Why is it important to update your computer's antivirus software?
15. When people use a computer to store data for rapid search and retrieval they likely use _____ software.
16. Aiming abusive and insulting messages at another person online is called _____
17. A users laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensitive file from the laptop has been found on another users laptop. How could the user have prevented this breach?
18. The short cut keys for selecting ALL of the text in a document are
19. The three floating-point types store/do not store values approximately. The most popular implementation is the IEEE (Eye-triple-E for the Institute of Electrical and Electronics Engineers) Standard 754 for _____ and Floating-Point Arithmetic.
20. Which of these computerised systems is NOT categorised as Critical?
21. Jacob has included a blog post in his references list for an English paper. Based on your knowledge of parts of a citation, which of the following citations should Jacob use?
22. Any software program that tracks system activity, gathers system information, or tracks user habits then relays this information to a third party
23. A small program that gets installed on a computer while browsing the Internet. The basic function of active content is to provide an interactive Internet experience through videos and toolbars. Sometimes, active content is used to gain unauthorized access to a computer, and then damage the data stored on it or install malicious software on it.
24. Rajesh receives emails asking him to send his bank account numbers in order to receive the money from a lottery he has won. What is the sender of the email doing?
25. This is a crucial attribute that is required of all problem solver
🏠 Back to Homepage 📘 Download PDF Books 📕 Premium PDF Books