We have sent an email with your new password.


Final Exam - It101

55 Questions  I  By Anthzila
Final Exam - IT101
The final exam for IT 101

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  ______________ is anything that can cause harm to our compupter resources.
A.
B.
C.
D.
2.  _____________is an act of attacking the mission critical information techniology infrastructure and government network sytsem of a particular country.
A.
B.
C.
3.  _____________ is a tecnique used by thefts to unsuspecting victim in providing critical information under the pretext of something legitimate such as pretending to be the one who is in authorty.
A.
B.
C.
4.  ____________ is watching someone who withdraws on the ATM machine, and getting to know his or her PIN number.
A.
B.
C.
D.
5.  ____________ is a website that offers free download of hardware drivers and software utilities.
A.
B.
C.
6.  ____________ is a program that works like a biological virus that spread from one computer through another with damaging effects.
A.
B.
C.
7.  ___________ is usually written in the webpage with an underline or it can be an image and if clicked navigates you to another page on the web.
A.
B.
C.
8.  ___________ is the first step in good computer security.
A.
B.
C.
9.  ___________ is defined as the means of doing and conducting business online with the use of the internet.
A.
B.
C.
10.  ___________ is an online encylopedia where you can research for many topics.
A.
B.
C.
11.  ___________ are trigerred to perform a task or a mission when it encounters som events such as a date came or a simple mouse click or opening of storage devices, or a certain amount of time elpased.
A.
B.
C.
12.  __________ are classified as unwanted emails entering in your inbox.
A.
B.
C.
13.  _________ is like a cookie that can track a computer users activities and report them to someone else.
A.
B.
C.
14.  _________ is defined as a step to ward off threat, thus protecting our data from harm.
A.
B.
C.
D.
15.  _________ is an illegal act of accessing the computer resources of some people without the knowledge or permission, or unauthorized access into company's network system.
A.
B.
C.
16.  _________ is an electronic letter equivalent of our postal mail and its sent over the internet.
A.
B.
C.
17.  _________ is a small code that a web server asks the web browser to place on the computer.
A.
B.
C.
18.  ________ is a gobal, cross platform and graphical system of organized hypertext information on the internet.
A.
B.
C.
19.  _______ is a technology term used when someone impersonates you.
A.
B.
C.
D.
20.  _____ is a collection of related  web documents.
A.
B.
C.
21.  You can buy directly in the internet through the merchant's website.  This process isknown as _________.
A.
B.
C.
22.  WWWW means _____________.
A.
B.
C.
23.  Whn purchasing items online, which of the following are the most accessible payment systems?
A.
B.
C.
24.  Which website is a search engine?
A.
B.
C.
25.  Which statement is true in the following when using antivirus?
A.
B.
C.
26.  Which statement is true about Ordinary Commerce?
A.
B.
C.
27.  Which of the following is true about Information Commerce?
A.
B.
C.
28.  What does the URL do?
A.
B.
C.
29.  What does google.com do?
A.
B.
C.
30.  What does FTP do?
A.
B.
C.
31.  URL means __________.
A.
B.
C.
32.  Unlike postal mails, emails will be received by the recipient in seconds.
A.
B.
33.  To avoid the spread of viruses, which of the following should be best applied when inserting a USB flash disk?
A.
B.
C.
34.  The use of wire tapping so that one can listen to any conversation over a telephone line is called __________.
A.
B.
C.
35.  The name of program that is used to open web pages is ________.
A.
B.
C.
36.  The famous "Hello Garci Tapes", which a conversation between the President and a COMELEC official was recorded, was an example of ___________.
A.
B.
C.
37.  In the following line: Type://internetaddress/path, what does the path mean?
A.
B.
C.
38.  HTTP means ___________.
A.
B.
C.
D.
39.  Email are sent to postal mails and is need of a stamp before it will be sent.
A.
B.
40.  Check more that one of the choices below to answer the question correctly. Which of the following is an e-commerce website?
A.
B.
C.
D.
41.  Check more that one choices to answer the question. Which of the following devices where computer virus can spread?
A.
B.
C.
D.
42.  Check more than one of the choices below to complete your answer. Which of the following are email services?
A.
B.
C.
D.
43.  Check more than one of the choices below to answer the question. Which of the following are social networking sites?
A.
B.
C.
D.
44.  Check more than one of the choices below to answer the question. Which of the following are messenger websites?
A.
B.
C.
D.
45.  Can a cookie be used as a spying tool?
A.
B.
46.  Any act of stealing hardware ad software resources are classified as _________.
A.
B.
C.
47.  A _____________ resides in the computers memory that can travel indepently over computer networks.
A.
B.
C.
48.  A __________ web server is a program that runs on the web site and its function is to response to the browsers request.
A.
B.
C.
49.  A _______ can be a usefull tool for hackers to capture passowrd.
A.
B.
C.
50.  A ______ is a program that performs a useful task, however it carries out some secret destructive motive and cruel intention.
A.
B.
C.
51.  A website where yu can share your favorite songs is __________.
A.
B.
C.
52.  A technique where a person can go to the garbage cans or trash bins to get cancelled checks, bank deposit slips or credit card statements is referred to as _________.
A.
B.
C.
53.  A software that is used to scan and destroy computer virus is called _____________.
A.
B.
C.
54.  A person who is running a bogus website pretending to be a hiring manager of a well known company.  He tricks website visitors he can help them have a job for the company with the condition that he deposits money for processing.  What technique is the person using?
A.
B.
C.
55.  A hacker employs __________ technique where he tries to guess the password of the hapless victim.
A.
B.
C.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz