Related Topics
Take Another Quiz

Final Exam - It101

55 Questions
Hardware Quizzes & Trivia

The final exam for IT 101

Questions and Answers
  • 1. 
    ______________ is anything that can cause harm to our compupter resources.
    • A. 

      Identity theft

    • B. 

      Threat

    • C. 

      Snagging

    • D. 

      Social Engineering

  • 2. 
    _____________is an act of attacking the mission critical information techniology infrastructure and government network sytsem of a particular country.
    • A. 

      Cybercrime

    • B. 

      Cyberterrorism

    • C. 

      Hacking

  • 3. 
    _____________ is a tecnique used by thefts to unsuspecting victim in providing critical information under the pretext of something legitimate such as pretending to be the one who is in authorty.
    • A. 

      Shoulder snapping

    • B. 

      Snagging

    • C. 

      Social engineering

  • 4. 
    ____________ is watching someone who withdraws on the ATM machine, and getting to know his or her PIN number.
    • A. 

      Shoulder watching

    • B. 

      Snatching

    • C. 

      Shoulder surfing

    • D. 

      Threatening

  • 5. 
    ____________ is a website that offers free download of hardware drivers and software utilities.
    • A. 

      Down.com

    • B. 

      Freestuff.com

    • C. 

      Download.com

  • 6. 
    ____________ is a program that works like a biological virus that spread from one computer through another with damaging effects.
    • A. 

      Computer virus

    • B. 

      Computer software

    • C. 

      Malware

  • 7. 
    ___________ is usually written in the webpage with an underline or it can be an image and if clicked navigates you to another page on the web.
    • A. 

      Link

    • B. 

      Hyperlink

    • C. 

      Menu

  • 8. 
    ___________ is the first step in good computer security.
    • A. 

      Awareness

    • B. 

      Threat

    • C. 

      Security

  • 9. 
    ___________ is defined as the means of doing and conducting business online with the use of the internet.
    • A. 

      Email

    • B. 

      Webpage

    • C. 

      E-commerce

  • 10. 
    ___________ is an online encylopedia where you can research for many topics.
    • A. 

      Google.com

    • B. 

      Youtube.com

    • C. 

      Wikipedia.com

  • 11. 
    ___________ are trigerred to perform a task or a mission when it encounters som events such as a date came or a simple mouse click or opening of storage devices, or a certain amount of time elpased.
    • A. 

      Worms

    • B. 

      Trojan

    • C. 

      Logic bomb

  • 12. 
    __________ are classified as unwanted emails entering in your inbox.
    • A. 

      Spam

    • B. 

      Spyware

    • C. 

      Cookies

  • 13. 
    _________ is like a cookie that can track a computer users activities and report them to someone else.
    • A. 

      Spam

    • B. 

      Cookies

    • C. 

      Spyware

  • 14. 
    _________ is defined as a step to ward off threat, thus protecting our data from harm.
    • A. 

      Indentity theft

    • B. 

      Countermeasure

    • C. 

      Snagging

    • D. 

      Social engineering

  • 15. 
    _________ is an illegal act of accessing the computer resources of some people without the knowledge or permission, or unauthorized access into company's network system.
    • A. 

      Hacking

    • B. 

      Cybercrime

    • C. 

      Cyberterrorism

  • 16. 
    _________ is an electronic letter equivalent of our postal mail and its sent over the internet.
    • A. 

      Website

    • B. 

      Webserver

    • C. 

      Email

  • 17. 
    _________ is a small code that a web server asks the web browser to place on the computer.
    • A. 

      Cookies

    • B. 

      Spyware

    • C. 

      Spam

  • 18. 
    ________ is a gobal, cross platform and graphical system of organized hypertext information on the internet.
    • A. 

      Email

    • B. 

      Internet

    • C. 

      World wide web

  • 19. 
    _______ is a technology term used when someone impersonates you.
    • A. 

      Identify theft

    • B. 

      Countermeasure

    • C. 

      Snagging

    • D. 

      Social engineering

  • 20. 
    _____ is a collection of related  web documents.
    • A. 

      Website

    • B. 

      Webserver

    • C. 

      Email

  • 21. 
    You can buy directly in the internet through the merchant's website.  This process isknown as _________.
    • A. 

      Online purchase

    • B. 

      Online shopping

    • C. 

      Online surfing

  • 22. 
    WWWW means _____________.
    • A. 

      World wide web

    • B. 

      World web wide

    • C. 

      Wide wide world

  • 23. 
    Whn purchasing items online, which of the following are the most accessible payment systems?
    • A. 

      Credit Card

    • B. 

      Money transfer

    • C. 

      Kwarta Padala

  • 24. 
    Which website is a search engine?
    • A. 

      Google.com

    • B. 

      Cnn.com

    • C. 

      Espn.com

  • 25. 
    Which statement is true in the following when using antivirus?
    • A. 

      Antivirus software should be manually activated to detect viruses.

    • B. 

      Antivirus software can detect all types of viruses.

    • C. 

      Antivirus software should be continually updated to detect new

  • 26. 
    Which statement is true about Ordinary Commerce?
    • A. 

      It sells services online

    • B. 

      It sells tangible goods online

    • C. 

      It sells downloadable software

  • 27. 
    Which of the following is true about Information Commerce?
    • A. 

      It sells MP3 files and is available for download

    • B. 

      It sells goods such as shoes, tshirt

    • C. 

      It sells services such as massage and haircut

  • 28. 
    What does the URL do?
    • A. 

      It opens the hypertext document

    • B. 

      It points to a specific information on the web

    • C. 

      It blocks viruses on the internet

  • 29. 
    What does google.com do?
    • A. 

      You can download and upload videos.

    • B. 

      You can send emails.

    • C. 

      You can search items on the web.

  • 30. 
    What does FTP do?
    • A. 

      It allows you to open websites

    • B. 

      It is the location of the files on your site

    • C. 

      It allows you to send and receive files

  • 31. 
    URL means __________.
    • A. 

      Universal resources locator

    • B. 

      Uniform resource locator

    • C. 

      Uniform resource location

  • 32. 
    Unlike postal mails, emails will be received by the recipient in seconds.
    • A. 

      True

    • B. 

      False

  • 33. 
    To avoid the spread of viruses, which of the following should be best applied when inserting a USB flash disk?
    • A. 

      Scan the flashdisk before accessing the files

    • B. 

      Move the files the computer then scan

    • C. 

      Copy the files to the computer then scan

  • 34. 
    The use of wire tapping so that one can listen to any conversation over a telephone line is called __________.
    • A. 

      Shoulder snapping

    • B. 

      Snagging

    • C. 

      Social engineering

  • 35. 
    The name of program that is used to open web pages is ________.
    • A. 

      Web browser

    • B. 

      Web viewer

    • C. 

      Html viewer

  • 36. 
    The famous "Hello Garci Tapes", which a conversation between the President and a COMELEC official was recorded, was an example of ___________.
    • A. 

      Snagging

    • B. 

      Social engineering

    • C. 

      Shoulder surfing

  • 37. 
    In the following line: Type://internetaddress/path, what does the path mean?
    • A. 

      It includes the folders on your site

    • B. 

      It is the location of the file structure of your site

    • C. 

      It the address of the website

  • 38. 
    HTTP means ___________.
    • A. 

      Hyperion text transport protocol

    • B. 

      Hypertext transport protocol

    • C. 

      Hypertext transfer prototype

    • D. 

      Hypertext transfer protocol

  • 39. 
    Email are sent to postal mails and is need of a stamp before it will be sent.
    • A. 

      True

    • B. 

      False

  • 40. 
    Check more that one of the choices below to answer the question correctly. Which of the following is an e-commerce website?
    • A. 

      Amazon.com

    • B. 

      Ebay.com

    • C. 

      Google.com

    • D. 

      Yahoo.com

  • 41. 
    Check more that one choices to answer the question. Which of the following devices where computer virus can spread?
    • A. 

      Flasdrive

    • B. 

      Network

    • C. 

      Diskette

    • D. 

      Air

  • 42. 
    Check more than one of the choices below to complete your answer. Which of the following are email services?
    • A. 

      Yahoo.com

    • B. 

      Gmail.com

    • C. 

      Yahoomail.com

    • D. 

      Hotmail.com

  • 43. 
    Check more than one of the choices below to answer the question. Which of the following are social networking sites?
    • A. 

      Facebook.com

    • B. 

      Myspace.com

    • C. 

      Yahoo.com

    • D. 

      Linkedin.com

  • 44. 
    Check more than one of the choices below to answer the question. Which of the following are messenger websites?
    • A. 

      Chikka.com

    • B. 

      Meebo.com

    • C. 

      Yahoomail.com

    • D. 

      Google.com

  • 45. 
    Can a cookie be used as a spying tool?
    • A. 

      True

    • B. 

      False

  • 46. 
    Any act of stealing hardware ad software resources are classified as _________.
    • A. 

      Hacking

    • B. 

      Cybercrime

    • C. 

      Cyberterrorism

  • 47. 
    A _____________ resides in the computers memory that can travel indepently over computer networks.
    • A. 

      Trojan

    • B. 

      Logic bomb

    • C. 

      Worms

  • 48. 
    A __________ web server is a program that runs on the web site and its function is to response to the browsers request.
    • A. 

      Website

    • B. 

      Email

    • C. 

      Webserver

  • 49. 
    A _______ can be a usefull tool for hackers to capture passowrd.
    • A. 

      Virus

    • B. 

      Malware

    • C. 

      Sniffer

  • 50. 
    A ______ is a program that performs a useful task, however it carries out some secret destructive motive and cruel intention.
    • A. 

      Trojan

    • B. 

      Worms

    • C. 

      Logic bomb

  • 51. 
    A website where yu can share your favorite songs is __________.
    • A. 

      Yahoo.com

    • B. 

      Msn.com

    • C. 

      Esnips.com

  • 52. 
    A technique where a person can go to the garbage cans or trash bins to get cancelled checks, bank deposit slips or credit card statements is referred to as _________.
    • A. 

      Shoulder surfing

    • B. 

      Identity theft

    • C. 

      Dumpster diving

  • 53. 
    A software that is used to scan and destroy computer virus is called _____________.
    • A. 

      Antivirus

    • B. 

      Antitheft

    • C. 

      Antibiotic

  • 54. 
    A person who is running a bogus website pretending to be a hiring manager of a well known company.  He tricks website visitors he can help them have a job for the company with the condition that he deposits money for processing.  What technique is the person using?
    • A. 

      Social engineering

    • B. 

      Snagging

    • C. 

      Shoulder surfing

  • 55. 
    A hacker employs __________ technique where he tries to guess the password of the hapless victim.
    • A. 

      Sniffing

    • B. 

      Crawling

    • C. 

      Guessing