a. Sharing hardware resources easily d. A and B areTrue b. Sharing information easily e. A,B and C are True c. Sharing Input easily Answer:
2. There are many types of Computer Network, except :
a.LAN d. BAN b. WAN e. MAN c. MAN Answer: 3.There are many types of Network Topology, except : a. Bus and Ring d. Star and Bus b. Star and Mesh e. Buss and Mehs c. Ring and Star Answer:
4.A piece of computer hardware designed to allow
computers to communicate over a computer network is … a.NIC d. RAN Card b.LAN Card e. A and B True c.NEC Answer: 5.There are the devices to create a computer network, except : a. NIC d. VGA b. Repeater e. Router c. Hub Answer:
6. The art and science of writing hidden messages in such a
way that no-one apart from the sender and intended recipient even realizes there is a hidden message : a. Stenography d. Steganography b. Cryptography e. All answer are false c. Cryptology Answer: 7. A steganography message will appear to be something else, like… a. A picture d. A and C true b. An article e. All Answers false c. A message Answer:
8. There are some technique steganography, except …
a. Writing a secret message using invisible ink b. Hidden messages on messenger's body c. A picture of a message in microdots or microfilms d. A copy file to another file. e. In computer era, steganography can be done by inserting a secret document into other document Answer: 9. The origin of steganography from …. a.Greek d. America b.Russia e. Germany c.England Answer:
10. The steganography usually use for …..
a. Covered d. Backup b. Hidden Writing e. A and B true c. Copy Answer: 11. The practice and study of creating a secret information. a. Stenography d. Stagenoghrapy b. Cryptography e. All answer are false c. Steganomy Answer:
12. A cryptography is used in applications present in
technologically advanced societies, the examples… a. Security of ATM cards d. A,B and C true b. Computer passwords e. Hidden Mesagge c. Electronic commerce A message Answer: 13. A machine called Enigma to encrypt and decrypt the messages in worl war II used by… a. German d. Italy b. America e. Russia c. France Answer:
14. The example of cryptography …
a. Greek d. Login b. Enigma e. A,B and C true c. Enogmist Answer: 15. The a secret text resulting from encryption process is …. a. Hidden Writing d. A and B true b. Chiper text e. No Answer c. Hidden text Answer:
16. What is the internet ….
a. A worldwide connection of millions of computers connected to thousands of different networks b. Each computer on the Internet c. Server d. Browsing e. All answer are false Answer: 17. Many kind of internet services, mentioned that ….. a. Browser d. B and C True b. World Wide web e. Wireless Network c. FTP Answer:
18. There are the examples of search engine ….
a. Google Crhome d. Opera b. Mozila Firefox e. All answers true c. Internet Explorer Answer: 19. The examples of search engine …. a. IRC d. A,B and C true b. Yahoo Messenger e. All Answers false c. Google Talk Answer:
20. What is the function Internet address domain ….
a. The domain name service address b.Host machine has a special Internet protocol address (IP address) that uniquely identifies that computer c. the domain name service address of the IP address d. A,B and C true e. All answers false Answer: 21. Method of creating, transmitting, or storing primarily text-based human communications with digital communications systems is … a. Server d. FTP b. Email e. WWW c. Attach File Answer:
to email …. a. Images d. Music file b. PDF file e. All Answers true c. DOC file Answer: 25. What is the meaning of BCc …. a. Bling Carbon Copy b. Bline Carbon Copy c. Blink Carbon Copy d. Blind Carbon Copy e. All answers false Answer:
26. What is the Website ….
a. A site (location) contains a collection of pages on the World Wide Web b. A site for information on the World Wide Web c. A site for search information d. a tool designed to search for information on the World Wide Web. e. All answers true Answer: 27. The function of website …. a.Bring information resources to the user b.Give directions to your place of business c.Introduction for your profile d.Searching information e. A, B and C True Answer:
28. A program that searches documents for specified
keywords … a. Website d. Google.com b. Search Engine e. All answers true c. Web Page Answer: 29. A document written in Hypertext Mark-up Language (HTML) …. a. Website d. Google.com b. Search Engine e. All answers true c. Web Page Answer:
30. The examples of search engine ….
a. Bing d. Yahoo b. Google e. All answers true c. Ask Answer: 31. A NIC, …, and a hub are needed to create a basic network. a. repeaters c. modulator b. socket d. jack Answer:
32. The network allows computers to … with each
other. a. commune c. collaborate b. coordinate d. communicate Answer: 33. NIC can be identified easily. It has a special port called …. a. AJ-45 c. RJ-45 b. RJ-54 d. AJ-54 Answer:
34. Another term for NIC is ….
a. repeaters c. adapter b. network adapter d. modem Answer: 35. What does ARPA stand for? a. Advance Research Projects Agency b. Advance Research Projects Affair c. Advanced Research Projects Agency d. Advanced Research Projects Affair Answer:
36. Steganography is the art and science of writing …
messages. a. readable c. computer b. hidden d. picture Answer: 37. Another secret coding technique besides steganography is …. a. cryptonite c. cryptic b. cryptography d. steganalyst Answer:
38. Steganography comes from … language.
a. Greek c. Greece b. Latin d. French Answer: 39. Writing a hidden message can use an … ink. a. invincible c. invisible b. inevitable d. indispensable Answer:
40. This document can be used as a media in
steganography, except …. a. text file c. picture file b. mp3 or video file d. none of the above Answer: 41. Nazi used a machine called … to encrypt and decrypt the messages. a. Sigma c. Encarta b. Enigma d. all false Answer:
42. A cryptographer is … who is master in
cryptography. a. Something c. someone b. anything d. anyone Answer: 43. “Graphy” is a Greek word means…. a. spoken c. uttered b. written d. hidden Answer:
44. Cryptography is needed to … a secret
document. a. secure c. save b. keep d. run Answer: 45. A secret text resulting from encryption process is called …. a. plain text c. code text b. cyber text d. cipher text Answer:
46. The first actual Web search engine was
developed by Matthew Gray in 1993 and was called …. a. spandex c. wantex b. wandex d. windex Answer: 47. Search engines powered by robots are called …. a. creepy crawlers c. bugs b. aunts d. spiders Answer:
48. At present there are still text-based
browsers like …. a. Lynx c. sync b. spynx d. none of the above Answer: 49. The following are search engines, except …. a. Win Vista c. Google b. MSN d. Excite Answer:
50. What does URL stand for?
a. Uniform Resource Location b. United Resource Local c. United Resource Locator d. Uniform Resource Locator Answer: 51. This component application allows people connected over the Internet to participate in discussions. a. Telnet c. IRC b. FTP d. EDI Answer:
52. This website is owned by a nonprofit
institution. a. www.cars.com c. www.carmagazine.co.uk b. www.car.org d. www.carzone.ie Answer: 53. This website is a government agency. a. ocw.mit.edu b. www.language-learning.net c. training.fema.gov d. www.carecourses.com Answer:
54. The Netiquette number 4 states that “You
shall not use a computer to ….” a. steal c. break b. hack d. deal Answer: 55. Recreational newsgroups start with …. a. alt c. soc b. rec d. sci Answer:
56. The conventional mail is called ….
a. email c. snail mail b. snake mail d. blackmail Answer: 57. An email message made up of these fields, except? a. server c. message body b. header d. signature Answer:
58. Commercial offers sent to our email without
our request is called …. a. phishing c. worm b. spam d. bomb Answer: 59. In message header, “To” is for the …. a. recipient’s address c. topic b. sender’s address d. time Answer:
60. It uses e-mail to duplicate themselves into
vulnerable computers. a. email bomb c. spam b. phishing d. email worm Answer: