Egf DC Online Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Stephen
S
Stephen
Community Contributor
Quizzes Created: 1 | Total Attempts: 201
| Attempts: 201 | Questions: 16
Please wait...
Question 1 / 16
0 %
0/100
Score 0/100
1. Which one is the keyboard shortcut for 'paste'?

Explanation

Ctrl + V is the correct keyboard shortcut for "paste". This shortcut is commonly used in various applications and operating systems to paste copied or cut content into a document or field. It is a widely recognized and easy-to-remember shortcut, making it a convenient way to quickly paste content without having to use the mouse or navigate through menus.

Submit
Please wait...
About This Quiz
Egf DC Online Test - Quiz

The EGF DC ONLINE TEST assesses knowledge on network security challenges, e-government services, and their importance. It includes questions on database types for businesses and e-payment benefits, crucial for professionals in IT and governance.

Personalize your quiz and earn a certificate with your name on it!
2. Which of the following is not an importance of e government ?

Explanation

Good corporate image is not an importance of e-government because it refers to the perception and reputation of a company or organization in the eyes of the public, stakeholders, and customers. While e-government can contribute to improving transparency, accountability, and service delivery, it does not directly impact the corporate image of a government entity. Other factors such as effective communication, ethical practices, and public trust play a more significant role in shaping a government's corporate image.

Submit
3. Which of the following is NOT a browser?

Explanation

Ubuntu is not a browser; it is an operating system. Google Chrome, Safari, and Firefox are all web browsers that allow users to access and navigate the internet.

Submit
4. Which Windows XP feature provides an underlying service that allows Windows and applications to determine when a machine changes network locations?

Explanation

Network Location Awareness (NLA) is the correct answer because it is a Windows XP feature that provides a service allowing Windows and applications to detect and respond to changes in network locations. This feature enables the system to automatically adjust network settings and configurations based on the network the machine is connected to. It helps ensure seamless connectivity and optimal performance by allowing the system to adapt to different network environments.

Submit
5. Which of the below is not a e-government service ?

Explanation

Digital Kenya is not a e-government service because it refers to the digital transformation and development of Kenya's economy, rather than a specific service provided by the government. IPRS, E citizen, and Itax are all examples of e-government services, which involve the use of technology to deliver government services to citizens electronically.

Submit
6. Which one of the following is not a challenges experienced in network security

Explanation

Ping is not a challenge experienced in network security. Ping is a network utility used to test the reachability of a host on an Internet Protocol (IP) network. It is a diagnostic tool rather than a security threat. Vandalism, hacking, and denial of service are all examples of challenges experienced in network security. Vandalism refers to deliberate damage or destruction of network resources, hacking involves unauthorized access or manipulation of network systems, and denial of service is an attack that disrupts the availability of network services.

Submit
7. Which of the below  list only has  types of data bases that can be implemented by business. 

Explanation

The correct answer is DB2, Oracle, Microsoft access. These are all types of databases that can be implemented by businesses. DB2 is a relational database management system (RDBMS) developed by IBM, Oracle is another popular RDBMS, and Microsoft Access is a desktop database management system. All three options consist of databases that are commonly used in business settings.

Submit
8. In electronic record keeping, espionage is one of the threat ,which of the following is the way to mitigate

Explanation

User classification and access policy is a way to mitigate the threat of espionage in electronic record keeping. By implementing user classification, organizations can assign different levels of access privileges to different users based on their roles and responsibilities. This ensures that only authorized individuals have access to sensitive information, reducing the risk of espionage. Additionally, access policies can be enforced to monitor and control user activities, further enhancing security measures.

Submit
9. E payment is beneficial to a small business. Which of below is not a benefit?

Explanation

Increased bank transactions is not a benefit of e-payment for a small business. While e-payment does increase the overall number of transactions, this particular benefit does not directly apply to a small business. The other options, such as reduced corruption level, time efficiency, and reduced risk of loss and theft, are all valid benefits that e-payment provides to small businesses.

Submit
10. Below are aspects to consider when deciding on a digital tool to use to market products and services of small business in Kenya .Which one is not ?

Explanation

The given question asks which aspect is not considered when deciding on a digital tool to market products and services of a small business in Kenya. The correct answer is "None of the choices." This means that all of the listed aspects (cost of tool, customer segmentation, tool accessibility, integration with other systems, and ease of use) are considered when deciding on a digital tool.

Submit
11. John wants to have internet service for his family members. What question would be appropriate to ask?

Explanation

The question "How many computers do you currently have?" would be appropriate to ask because it helps determine the number of devices that need to be connected to the internet. This information is important in order to choose the appropriate internet service plan that can accommodate the needs of all family members.

Submit
12. Which of the following is not an operating system?

Explanation

All the options provided in the question are operating systems. Windows 7, Linux, MAC OSX, and DOS are all examples of operating systems. Therefore, the correct answer is "None of the above" because all the given options are operating systems.

Submit
13. Jenny called and is looking for an internet service that will allow her to access her work emails while she travels. Knowing Jenny's need for an internet service, how would you position the dial-up service?

Explanation

The correct answer explains that the accelerated Dial-Up service is the best fit for Jenny because it offers top-of-the-line accelerator software that allows her to access her work emails up to 5x faster than other dial-up services. Additionally, it mentions the convenience of having over 9000 access numbers worldwide, ensuring she can connect to the internet wherever she is. The answer also highlights the affordability of the service at Ksh 1400/mo for 12 months, emphasizing that Jenny will never miss a single email. The question is positioning the dial-up service as the best option for Jenny's need to access work emails while traveling.

Submit
14. Below are some of the causes of network connectivity failure. Which one is not?

Explanation

The correct answer is "Non of the choices given." This means that none of the causes listed (client server problems, error in configuration, protocol mismatch, user policy and right issue, device may not be plugged in) are the reason for network connectivity failure.

Submit
15. Lisa is a home-based webpage manager. She mostly uploads pictures and video presentations on her web page. Knowing Lisa's needs, how would you present the product to her?

Explanation

The given answer is the most suitable presentation for Lisa because it highlights the specific features of the DSL service that meet her needs as a home-based webpage manager. It emphasizes the hassle-free high-speed service, the fast upload speed for posting pictures and video presentations, and the affordable pricing options. The answer also includes a call to action by suggesting to set up the service, making it a persuasive and tailored offer for Lisa.

Submit
16. As an administrator, you find that some unknown IP addresses are trying to make remote desktop connection to your machine and trying to attack it. How will you find which IP addresses are trying to do so?

Explanation

The correct answer is "Command > netstat -a -n -o". By using this command, the administrator can view all active connections on their machine, including the IP addresses, the corresponding port numbers, and the process ID (PID) of the program that is using the connection. By examining this information, the administrator can identify the IP addresses that are attempting to make remote desktop connections and potentially launch attacks on their machine.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 17, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 12, 2019
    Quiz Created by
    Stephen
Cancel
  • All
    All (16)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which one is the keyboard shortcut for 'paste'?
Which of the following is not an importance of e government ?
Which of the following is NOT a browser?
Which Windows XP feature provides an underlying service that allows...
Which of the below is not a e-government service ?
Which one of the following is not a challenges experienced in network...
Which of the below  list only has  types of data bases that...
In electronic record keeping, espionage is one of the threat ,which of...
E payment is beneficial to a small business. Which of below is not a...
Below are aspects to consider when deciding on a digital tool to use...
John wants to have internet service for his family members. What...
Which of the following is not an operating system?
Jenny called and is looking for an internet service that will allow...
Below are some of the causes of network connectivity failure. Which...
Lisa is a home-based webpage manager. She mostly uploads pictures and...
As an administrator, you find that some unknown IP addresses are...
Alert!

Advertisement