A) Asymmetric
B) Public
C) Symmetric
D) Private
E) User
It is any computer code that has a malicious intent
A) Asymmetric key
B) Symmetric key
C) Plaintext
D) Cipher-text e) Malware
It is a small program that alters the way a computer operates and often does various types of damage by deleting and corrupting data and program files, or by altering operating system components, so that computer operation is impaired or even halted
A) Asymmetric key
B) A symmetric key c) A computer virus
D) A plaintext
E) A cipher-text
It is a type of malware that bombards you with endless ads and pop-up windows that could potentially be dangerous for your device
A) Denial of service attack b) An adware
C) A computer worm
D) A trojan horse
E) A spyware
It is a nasty technique in which a program attacks a network by exploiting IP broadcast addressing operations
A) Smurfing
B) Ping storm
C) A dictionary attack
D) Denial of service attack
E) e-mail bombing
An agreement between two or more parties about what rules will be followed when communication takes place
A) World Wide Web (WWW)
B) CERN (European Organization for Nuclear Research)
C) HTML
D) Communication protocol
E) Mosaic
Protocol for transfer files between local and remote host computers
A) TCP (Transmission Control Protocol)
B) IP (Internet Protocol)
C) FTP (File Transfer Protocol)
D) UDP (User Datagram Protocol)
E) HTTP (Hypertext Transfer protocol)
It is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology
A) An information model
B) A database model
C) A hardware model
D) A software model
E) The Open Systems Interconnection model (OSI model)
It s a set of specifications for creating documents that a browser can display as a Web page
A) Programming language
B) Text language
C) HTML (Hypertext Markup Language)
D) Java Script
E) HTML tag
This is both a combination of software and hardware based computing resources delivered as a network service
A) WAN
B) Cloud Computing
C) LAN
D) VPN
E) Web conferencing
This type of Cloud allows systems and services to be accessible by group of organizations
|
|
A) The Hybrid Cloud
B) The User Cloud
C) The Private Cloud
D) The Public Cloud
E) The Community Cloud
It is NOT one of the Service Models which the Cloud Computing is based
A) IaaS (Infrastructure-as-a-Service)
B) PaaS (Platform-as-a-Service)
C) SaaS (Software-as-a-Service) d) CaaS (Computer-as-a-Service)
e) DaaS (Data-as-a-Service)
This is the technology used for cellular communication a) Mobile technology
B) Network technology
C) PS technology
D) User technology
E) Private technology
The combination of text, graphic art, sound, animation, and video that is delivered by computer
A) Television
B) A mass media c) A multimedia
D) A transmission media
E) A storage media
Linear active content progresses without any navigational control for the viewer
A) A non-linear multimedia
B) A mass multimedia c) A linear multimedia
D) A transmission multimedia
E) A storage multimedia
262. All media including audio/video are represented in digital format
A) Distributed
B) Computer controlled
C) Interactive d) Digitized
e) Integrated
It is computer-based techniques of text, images, audio, video, graphics, animation, and any other medium where every type of information can be represented, processed, stored, transmitted, produced and presented digitally
A) A multimedia
B) A virtualization
C) A networking
D) A television
E) A communication
It is music, speech, and other sounds represented in binary format for use in digital devices
A) A digital audio
B) A text
C) An audio
D) A video
E) An animation
It is composed of a grid of dots a) A bitmap graphic
B) A digital audio
C) A text
D) An audio
E) A vector graphic