Final Exam - It101

55 Questions | Total Attempts: 136

SettingsSettingsSettings
Please wait...
Hardware Quizzes & Trivia

The final exam for IT 101


Questions and Answers
  • 1. 
    ______________ is anything that can cause harm to our compupter resources.
    • A. 

      Identity theft

    • B. 

      Threat

    • C. 

      Snagging

    • D. 

      Social Engineering

  • 2. 
    _____________is an act of attacking the mission critical information techniology infrastructure and government network sytsem of a particular country.
    • A. 

      Cybercrime

    • B. 

      Cyberterrorism

    • C. 

      Hacking

  • 3. 
    _____________ is a tecnique used by thefts to unsuspecting victim in providing critical information under the pretext of something legitimate such as pretending to be the one who is in authorty.
    • A. 

      Shoulder snapping

    • B. 

      Snagging

    • C. 

      Social engineering

  • 4. 
    ____________ is watching someone who withdraws on the ATM machine, and getting to know his or her PIN number.
    • A. 

      Shoulder watching

    • B. 

      Snatching

    • C. 

      Shoulder surfing

    • D. 

      Threatening

  • 5. 
    ____________ is a website that offers free download of hardware drivers and software utilities.
    • A. 

      Down.com

    • B. 

      Freestuff.com

    • C. 

      Download.com

  • 6. 
    ____________ is a program that works like a biological virus that spread from one computer through another with damaging effects.
    • A. 

      Computer virus

    • B. 

      Computer software

    • C. 

      Malware

  • 7. 
    ___________ is usually written in the webpage with an underline or it can be an image and if clicked navigates you to another page on the web.
    • A. 

      Link

    • B. 

      Hyperlink

    • C. 

      Menu

  • 8. 
    ___________ is the first step in good computer security.
    • A. 

      Awareness

    • B. 

      Threat

    • C. 

      Security

  • 9. 
    ___________ is defined as the means of doing and conducting business online with the use of the internet.
    • A. 

      Email

    • B. 

      Webpage

    • C. 

      E-commerce

  • 10. 
    ___________ is an online encylopedia where you can research for many topics.
    • A. 

      Google.com

    • B. 

      Youtube.com

    • C. 

      Wikipedia.com

  • 11. 
    ___________ are trigerred to perform a task or a mission when it encounters som events such as a date came or a simple mouse click or opening of storage devices, or a certain amount of time elpased.
    • A. 

      Worms

    • B. 

      Trojan

    • C. 

      Logic bomb

  • 12. 
    __________ are classified as unwanted emails entering in your inbox.
    • A. 

      Spam

    • B. 

      Spyware

    • C. 

      Cookies

  • 13. 
    _________ is like a cookie that can track a computer users activities and report them to someone else.
    • A. 

      Spam

    • B. 

      Cookies

    • C. 

      Spyware

  • 14. 
    _________ is defined as a step to ward off threat, thus protecting our data from harm.
    • A. 

      Indentity theft

    • B. 

      Countermeasure

    • C. 

      Snagging

    • D. 

      Social engineering

  • 15. 
    _________ is an illegal act of accessing the computer resources of some people without the knowledge or permission, or unauthorized access into company's network system.
    • A. 

      Hacking

    • B. 

      Cybercrime

    • C. 

      Cyberterrorism

  • 16. 
    _________ is an electronic letter equivalent of our postal mail and its sent over the internet.
    • A. 

      Website

    • B. 

      Webserver

    • C. 

      Email

  • 17. 
    _________ is a small code that a web server asks the web browser to place on the computer.
    • A. 

      Cookies

    • B. 

      Spyware

    • C. 

      Spam

  • 18. 
    ________ is a gobal, cross platform and graphical system of organized hypertext information on the internet.
    • A. 

      Email

    • B. 

      Internet

    • C. 

      World wide web

  • 19. 
    _______ is a technology term used when someone impersonates you.
    • A. 

      Identify theft

    • B. 

      Countermeasure

    • C. 

      Snagging

    • D. 

      Social engineering

  • 20. 
    _____ is a collection of related  web documents.
    • A. 

      Website

    • B. 

      Webserver

    • C. 

      Email

  • 21. 
    You can buy directly in the internet through the merchant's website.  This process isknown as _________.
    • A. 

      Online purchase

    • B. 

      Online shopping

    • C. 

      Online surfing

  • 22. 
    WWWW means _____________.
    • A. 

      World wide web

    • B. 

      World web wide

    • C. 

      Wide wide world

  • 23. 
    Whn purchasing items online, which of the following are the most accessible payment systems?
    • A. 

      Credit Card

    • B. 

      Money transfer

    • C. 

      Kwarta Padala

  • 24. 
    Which website is a search engine?
    • A. 

      Google.com

    • B. 

      Cnn.com

    • C. 

      Espn.com

  • 25. 
    Which statement is true in the following when using antivirus?
    • A. 

      Antivirus software should be manually activated to detect viruses.

    • B. 

      Antivirus software can detect all types of viruses.

    • C. 

      Antivirus software should be continually updated to detect new

Back to Top Back to top