.


:




:

































 

 

 

 


Same key for encryption and decryption. This encryption algorithm called

A) Asymmetric

B) Public

C) Symmetric

D) Private

E) User

It is any computer code that has a malicious intent

A) Asymmetric key

B) Symmetric key

C) Plaintext

D) Cipher-text e) Malware

It is a small program that alters the way a computer operates and often does various types of damage by deleting and corrupting data and program files, or by altering operating system components, so that computer operation is impaired or even halted

A) Asymmetric key

B) A symmetric key c) A computer virus

D) A plaintext

E) A cipher-text

It is a type of malware that bombards you with endless ads and pop-up windows that could potentially be dangerous for your device

A) Denial of service attack b) An adware

C) A computer worm

D) A trojan horse

E) A spyware

It is a nasty technique in which a program attacks a network by exploiting IP broadcast addressing operations

A) Smurfing

B) Ping storm

C) A dictionary attack

D) Denial of service attack

E) e-mail bombing

An agreement between two or more parties about what rules will be followed when communication takes place

A) World Wide Web (WWW)

B) CERN (European Organization for Nuclear Research)

C) HTML

D) Communication protocol

E) Mosaic

Protocol for transfer files between local and remote host computers

A) TCP (Transmission Control Protocol)

B) IP (Internet Protocol)


C) FTP (File Transfer Protocol)

D) UDP (User Datagram Protocol)

E) HTTP (Hypertext Transfer protocol)

It is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology

A) An information model

B) A database model

C) A hardware model

D) A software model

E) The Open Systems Interconnection model (OSI model)

It s a set of specifications for creating documents that a browser can display as a Web page

A) Programming language

B) Text language

C) HTML (Hypertext Markup Language)

D) Java Script

E) HTML tag

This is both a combination of software and hardware based computing resources delivered as a network service

A) WAN

B) Cloud Computing

C) LAN

D) VPN

E) Web conferencing

This type of Cloud allows systems and services to be accessible by group of organizations

A) The Hybrid Cloud

B) The User Cloud

C) The Private Cloud

D) The Public Cloud

E) The Community Cloud

It is NOT one of the Service Models which the Cloud Computing is based

A) IaaS (Infrastructure-as-a-Service)

B) PaaS (Platform-as-a-Service)

C) SaaS (Software-as-a-Service) d) CaaS (Computer-as-a-Service)

e) DaaS (Data-as-a-Service)

This is the technology used for cellular communication a) Mobile technology

B) Network technology

C) PS technology

D) User technology

E) Private technology

The combination of text, graphic art, sound, animation, and video that is delivered by computer

A) Television

B) A mass media c) A multimedia


D) A transmission media

E) A storage media

Linear active content progresses without any navigational control for the viewer

A) A non-linear multimedia

B) A mass multimedia c) A linear multimedia

D) A transmission multimedia

E) A storage multimedia

262. All media including audio/video are represented in digital format

A) Distributed

B) Computer controlled

C) Interactive d) Digitized

e) Integrated

It is computer-based techniques of text, images, audio, video, graphics, animation, and any other medium where every type of information can be represented, processed, stored, transmitted, produced and presented digitally

A) A multimedia

B) A virtualization

C) A networking

D) A television

E) A communication

It is music, speech, and other sounds represented in binary format for use in digital devices

A) A digital audio

B) A text

C) An audio

D) A video

E) An animation

It is composed of a grid of dots a) A bitmap graphic

B) A digital audio

C) A text

D) An audio

E) A vector graphic



<== | ==>
Last step of knowledge discovery process | Introduction to computer systems.
:


: 2018-11-11; !; : 176 |


:

:

, .
==> ...

1837 - | 1644 -


© 2015-2024 lektsii.org - -

: 0.014 .