- Which of the following is NOT one of the four major data processing functions of a computer__________
1) gathering data
2) processing data into information
3) analyzing the data or information
4) storing the data or information
5) None of these
- Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
1) languages
2) methods
3) CPUs
4) storage devices
5) None of these
- User actions such as keystrokes or mouse clicks are referred to as__________
1) Interrupts
2) Tasks
3) Events
4) Processes
5) None of these
- Microsoft’s Access and Corel’s Paradox are both examples of which type of software?
1) Network database systems
2) Relational database systems
3) Flat-file database systems
4) Hierarchical database systems
5) None of these
- To read the system messages and warnings, access the __________ in Windows.
1) system manager
2) control panel
3) event viewer
4) message screen
5) None of these
- In the right setting a thief will steal your information by simply watching what you type________
1) snagging
2) spying
3) social engineering
4) shoulder surfing
5) None of these
- The __________ of a threat measures its potential impact on a system.
1) vulnerabilities
2) countermeasures
3) degree of harm
4) susceptibility
5) none of these
- Most dangerous risk in leaking of information is___________
1) Ready access to online terminals
2) Online processing of data
3) Ignorance about the existence of risk
4) All of these
5) none of these
- MCI and AT&T are examples of which of the following?
1) Social networks
2) Communications systems
3) Internet service providers
4) Mobisodes
5) None of these
- What type of web technology provides news that can automatically download right to your desktop________
1) Social network
2) RSS feed
3) Podcast
4) Wiki
5) None of these
Thursday, December 31, 2015
GK
Labels:
quiz
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment