J WVQ 8 P F3 IQhzw Dde CF 3 CH Askp 8 F J3 D3 TDSTF NFig

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

Name :

Student’s Reg. Number :


Class :

1. The benefits of a computer network are


a. Sharing hardware resources easily d. A and B areTrue
b. Sharing information easily e. A,B and C are True
c. Sharing Input easily
Answer:

2. There are many types of Computer Network, except :


a.LAN d. BAN
b. WAN e. MAN
c. MAN
Answer:
3.There are many types of Network Topology, except
:
a. Bus and Ring d. Star and Bus
b. Star and Mesh e. Buss and Mehs
c. Ring and Star
Answer:

4.A piece of computer hardware designed to allow


computers to communicate over a computer
network is …
a.NIC d. RAN Card
b.LAN Card e. A and B True
c.NEC
Answer:
5.There are the devices to create a computer network,
except :
a. NIC d. VGA
b. Repeater e. Router
c. Hub
Answer:

6. The art and science of writing hidden messages in such a


way that no-one apart from the sender and intended
recipient even realizes there is a hidden message :
a. Stenography d. Steganography
b. Cryptography e. All answer are false
c. Cryptology
Answer:
7. A steganography message will appear to be something
else, like…
a. A picture d. A and C true
b. An article e. All Answers false
c. A message
Answer:

8. There are some technique steganography, except …


a. Writing a secret message using invisible ink
b. Hidden messages on messenger's body
c. A picture of a message in microdots or microfilms
d. A copy file to another file.
e. In computer era, steganography can be done by inserting
a secret document into other document
Answer:
9. The origin of steganography from ….
a.Greek d. America
b.Russia e. Germany
c.England
Answer:

10. The steganography usually use for …..


a. Covered d. Backup
b. Hidden Writing e. A and B true
c. Copy
Answer:
11. The practice and study of creating a secret
information.
a. Stenography d. Stagenoghrapy
b. Cryptography e. All answer are false
c. Steganomy
Answer:

12. A cryptography is used in applications present in


technologically advanced societies, the examples…
a. Security of ATM cards d. A,B and C true
b. Computer passwords e. Hidden Mesagge
c. Electronic commerce A message
Answer:
13. A machine called Enigma to encrypt and decrypt
the messages in worl war II used by…
a. German d. Italy
b. America e. Russia
c. France
Answer:

14. The example of cryptography …


a. Greek d. Login
b. Enigma e. A,B and C true
c. Enogmist
Answer:
15. The a secret text resulting from encryption process is ….
a. Hidden Writing d. A and B true
b. Chiper text e. No Answer
c. Hidden text
Answer:

16. What is the internet ….


a. A worldwide connection of millions of computers
connected to thousands of different networks
b. Each computer on the Internet
c. Server
d. Browsing
e. All answer are false
Answer:
17. Many kind of internet services, mentioned that
…..
a. Browser d. B and C True
b. World Wide web e. Wireless Network
c. FTP
Answer:

18. There are the examples of search engine ….


a. Google Crhome d. Opera
b. Mozila Firefox e. All answers true
c. Internet Explorer
Answer:
19. The examples of search engine ….
a. IRC d. A,B and C true
b. Yahoo Messenger e. All Answers false
c. Google Talk
Answer:

20. What is the function Internet address domain ….


a. The domain name service address
b.Host machine has a special Internet protocol address (IP
address) that uniquely identifies that computer
c. the domain name service address of the IP address
d. A,B and C true
e. All answers false
Answer:
21. Method of creating, transmitting, or storing
primarily text-based human communications
with digital communications systems is …
a. Server d. FTP
b. Email e. WWW
c. Attach File
Answer:

22. The are several part of Email …..


a. Header d. A and C True
b. World Wide web e. Address
c. Message Body
Answer:
23. There are the examples of Email Address,
except ….
a. [email protected] d. [email protected]
b. [email protected] e. www.bsi.ac.id
c. [email protected]
Answer:

24. What kinds of document that could attach file


to email ….
a. Images d. Music file
b. PDF file e. All Answers true
c. DOC file
Answer:
25. What is the meaning of BCc ….
a. Bling Carbon Copy
b. Bline Carbon Copy
c. Blink Carbon Copy
d. Blind Carbon Copy
e. All answers false
Answer:

26. What is the Website ….


a. A site (location) contains a collection of pages on the World Wide Web
b. A site for information on the World Wide Web
c. A site for search information
d. a tool designed to search for information on the World Wide Web.
e. All answers true
Answer:
27. The function of website ….
a.Bring information resources to the user
b.Give directions to your place of business
c.Introduction for your profile
d.Searching information
e. A, B and C True
Answer:

28. A program that searches documents for specified


keywords …
a. Website d. Google.com
b. Search Engine e. All answers true
c. Web Page
Answer:
29. A document written in Hypertext Mark-up
Language (HTML) ….
a. Website d. Google.com
b. Search Engine e. All answers true
c. Web Page
Answer:

30. The examples of search engine ….


a. Bing d. Yahoo
b. Google e. All answers true
c. Ask
Answer:
31. A NIC, …, and a hub are needed to create a
basic network.
a. repeaters c. modulator
b. socket d. jack
Answer:

32. The network allows computers to … with each


other.
a. commune c. collaborate
b. coordinate d. communicate
Answer:
33. NIC can be identified easily. It has a special
port called ….
a. AJ-45 c. RJ-45
b. RJ-54 d. AJ-54
Answer:

34. Another term for NIC is ….


a. repeaters c. adapter
b. network adapter d. modem
Answer:
35. What does ARPA stand for?
a. Advance Research Projects Agency
b. Advance Research Projects Affair
c. Advanced Research Projects Agency
d. Advanced Research Projects Affair
Answer:

36. Steganography is the art and science of writing …


messages.
a. readable c. computer
b. hidden d. picture
Answer:
37. Another secret coding technique besides
steganography is ….
a. cryptonite c. cryptic
b. cryptography d. steganalyst
Answer:

38. Steganography comes from … language.


a. Greek c. Greece
b. Latin d. French
Answer:
39. Writing a hidden message can use an … ink.
a. invincible c. invisible
b. inevitable d. indispensable
Answer:

40. This document can be used as a media in


steganography, except ….
a. text file c. picture file
b. mp3 or video file d. none of the above
Answer:
41. Nazi used a machine called … to encrypt and
decrypt the messages.
a. Sigma c. Encarta
b. Enigma d. all false
Answer:

42. A cryptographer is … who is master in


cryptography.
a. Something c. someone
b. anything d. anyone
Answer:
43. “Graphy” is a Greek word means….
a. spoken c. uttered
b. written d. hidden
Answer:

44. Cryptography is needed to … a secret


document.
a. secure c. save
b. keep d. run
Answer:
45. A secret text resulting from encryption
process is called ….
a. plain text c. code text
b. cyber text d. cipher text
Answer:

46. The first actual Web search engine was


developed by Matthew Gray in 1993 and was
called ….
a. spandex c. wantex
b. wandex d. windex
Answer:
47. Search engines powered by robots are called
….
a. creepy crawlers c. bugs
b. aunts d. spiders
Answer:

48. At present there are still text-based


browsers like ….
a. Lynx c. sync
b. spynx d. none of the above
Answer:
49. The following are search engines, except ….
a. Win Vista c. Google
b. MSN d. Excite
Answer:

50. What does URL stand for?


a. Uniform Resource Location
b. United Resource Local
c. United Resource Locator
d. Uniform Resource Locator
Answer:
51. This component application allows people
connected over the Internet to participate in
discussions.
a. Telnet c. IRC
b. FTP d. EDI
Answer:

52. This website is owned by a nonprofit


institution.
a. www.cars.com c.
www.carmagazine.co.uk
b. www.car.org d. www.carzone.ie
Answer:
53. This website is a government agency.
a. ocw.mit.edu
b. www.language-learning.net
c. training.fema.gov
d. www.carecourses.com
Answer:

54. The Netiquette number 4 states that “You


shall not use a computer to ….”
a. steal c. break
b. hack d. deal
Answer:
55. Recreational newsgroups start with ….
a. alt c. soc
b. rec d. sci
Answer:

56. The conventional mail is called ….


a. email c. snail mail
b. snake mail d. blackmail
Answer:
57. An email message made up of these fields,
except?
a. server c. message body
b. header d. signature
Answer:

58. Commercial offers sent to our email without


our request is called ….
a. phishing c. worm
b. spam d. bomb
Answer:
59. In message header, “To” is for the ….
a. recipient’s address c. topic
b. sender’s address d. time
Answer:

60. It uses e-mail to duplicate themselves into


vulnerable computers.
a. email bomb c. spam
b. phishing d. email worm
Answer:

You might also like