Quiz On Data Processing

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Arinzeprince
A
Arinzeprince
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,798
Questions: 42 | Attempts: 1,457

SettingsSettingsSettings
Quiz On Data Processing - Quiz

This is an online quiz on data processing and is designed. Data is a vital and very important part of today's world, and just like that, data processing has become a major concern. The quiz here has several questions on data processing and its various aspects. You will not only get an opportunity to test your knowledge as well as expand it. All the best to you with this quiz.


Questions and Answers
  • 1. 

    The compilation of data that is arranged for better and faster retrieval and is accessed via computers is known as

    • A.

      browsing

    • B.

      Internet

    • C.

      Database

    • D.

      Online database

    Correct Answer
    D. Online database
    Explanation
    An online database is the correct answer because it refers to a compilation of data that is organized and stored in a way that allows for efficient retrieval and access through computers. Unlike browsing or the internet, which are broader terms, an online database specifically focuses on the structured storage and retrieval of data.

    Rate this question:

  • 2. 

    ____________ allows or disallows user actions on the database and objects within it

    • A.

      Database

    • B.

      Internet

    • C.

      Database security

    • D.

      Internet security

    Correct Answer
    C. Database security
    Explanation
    Database security refers to the measures and controls put in place to protect a database from unauthorized access, misuse, or any other potential threats. It includes various mechanisms such as authentication, authorization, encryption, and auditing to ensure that only authorized users can access and manipulate the database and its objects. By allowing or disallowing user actions on the database and objects within it, database security plays a crucial role in maintaining the integrity, confidentiality, and availability of the data stored in the database.

    Rate this question:

  • 3. 

    There are three generally accepted categories of secrecy-related problems in data base systems include all except

    • A.

      The improper release of information from reading data that was intentionally or accidentally accessed by unauthorized users

    • B.

      The improper modification of data

    • C.

      Accepting and initiating unwanted popups.

    • D.

      Denial-of-service threats

    Correct Answer
    C. Accepting and initiating unwanted popups.
    Explanation
    The given answer, "Accepting and initiating unwanted popups," is the correct answer because it does not belong to the three generally accepted categories of secrecy-related problems in database systems. The other three options, which are the improper release of information, the improper modification of data, and denial-of-service threats, are all examples of secrecy-related problems that can occur in database systems. However, accepting and initiating unwanted popups is not directly related to secrecy or data protection in a database system.

    Rate this question:

  • 4. 

    Security risks to database systems include all except

    • A.

      Unintended activity or misuse by authorized database users

    • B.

      Modification of database data by the administrator

    • C.

      Physical damage to database servers caused by computer room fires or floods

    • D.

      Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data

    Correct Answer
    B. Modification of database data by the administrator
    Explanation
    The correct answer is "modification of database data by the administrator." This is because administrators have authorized access to the database system and are responsible for managing and maintaining it. Therefore, their actions are not considered a security risk but rather a part of their role. The other options listed all represent potential security risks, such as unauthorized access, data leakage, physical damage, and unintended misuse by authorized users.

    Rate this question:

  • 5. 

    One reason why people ignore index is because

    • A.

      They may make your queries slower instead of faster

    • B.

      Users have the opportunity to optimize searching against even large amounts of text located in any field indexed as such

    • C.

      They make search queries much faster

    • D.

      Help to avoid duplicate row data

    Correct Answer
    A. They may make your queries slower instead of faster
    Explanation
    Indexes are used to speed up search queries by allowing the database to quickly locate the desired data. However, in some cases, indexes can actually slow down queries. This can happen when the index is not properly designed or when the query requires a large number of rows to be retrieved. In such cases, the database engine may spend more time searching through the index than it would take to scan the entire table. Therefore, people may choose to ignore indexes if they believe that the indexes will not improve the performance of their queries.

    Rate this question:

  • 6. 

    One importance of database security is

    • A.

      Confidential misconduct

    • B.

      Ensure the data confidentiality

    • C.

      Preventing authorized user

    • D.

      Prevent authorized data modification

    Correct Answer
    B. Ensure the data confidentiality
    Explanation
    The importance of database security lies in ensuring the confidentiality of data. This means that unauthorized individuals or entities should not be able to access or view sensitive information stored in the database. By implementing security measures such as access controls, encryption, and authentication protocols, the data can be protected from unauthorized access, thereby maintaining its confidentiality.

    Rate this question:

  • 7. 

    The goal of crash and instance recovery is to restore the data block changes located in the cache of the dead instance and to

    • A.

      Prevent authorized users from accessing files

    • B.

      Blog spammers

    • C.

      Close the redo thread that was left open

    • D.

      Control which data is uploaded and downloaded

    Correct Answer
    C. Close the redo thread that was left open
    Explanation
    The goal of crash and instance recovery is to restore the data block changes located in the cache of the dead instance. In the event of a crash or failure, there may be data changes that were not yet written to disk. The redo thread, which is responsible for writing these changes to disk, may have been left open during the crash. Closing the redo thread ensures that all pending changes are written to disk and the database is brought back to a consistent state.

    Rate this question:

  • 8. 

    One of these is not a key issue in the security of database

    • A.

      Importance

    • B.

      Privacy

    • C.

      Availability

    • D.

      Disclosure

    Correct Answer
    D. Disclosure
    Explanation
    Disclosure refers to the act of making information known or revealing it to others. In the context of database security, disclosure is not a key issue because it does not directly relate to the protection and integrity of the database. The other options - importance, privacy, and availability - are all crucial aspects of database security. Importance refers to the significance of the data and the need to protect it. Privacy involves ensuring that only authorized individuals have access to the data. Availability refers to the accessibility and reliability of the database for authorized users.

    Rate this question:

  • 9. 

    The database security issued that is concerned with improper denial of access to information is known as

    • A.

      Disclosure

    • B.

      Privacy

    • C.

      Availability

    • D.

      Secrecy

    Correct Answer
    C. Availability
    Explanation
    The correct answer is availability. Availability is the database security issue that deals with ensuring that authorized users have access to the information they need, while preventing unauthorized users from accessing the information. It focuses on preventing improper denial of access to information, such as denial of service attacks or system failures that result in the unavailability of data.

    Rate this question:

  • 10. 

    Encryption is useful especially to

    • A.

      Block unwanted user from browsing the internet

    • B.

      Control which user is accessing the internet

    • C.

      Give access only to people known by an admin

    • D.

      Pass a secret message from one place to another without anyone else being able to read it

    Correct Answer
    D. Pass a secret message from one place to another without anyone else being able to read it
    Explanation
    Encryption is a process of converting information into a code or cipher to prevent unauthorized access. It is useful for passing a secret message from one place to another without anyone else being able to read it. By encrypting the message, it ensures that only the intended recipient with the correct decryption key can decipher and understand the content, providing confidentiality and security. The other options mentioned, such as blocking unwanted users, controlling internet access, or giving access only to known individuals, are not directly related to the purpose of encryption.

    Rate this question:

  • 11. 

    One of the following indexes does not exist 

    • A.

      Book

    • B.

      Indexes

    • C.

      Human

    • D.

      Citation

    Correct Answer
    C. Human
    Explanation
    The correct answer is "human" because it is the only word in the given list that does not refer to a type of index. "Book indexes" and "citation" both refer to indexes related to books or written materials, while "indexes" is a plural form of "index." Therefore, "human" is the only word that does not fit the category of indexes.

    Rate this question:

  • 12. 

    One problem of encryption is that it is 

    • A.

      Easy to install

    • B.

      Slower than normal browsing

    • C.

      The highest security feature to use

    • D.

      Available to everyone

    Correct Answer
    B. Slower than normal browsing
    Explanation
    Encryption is slower than normal browsing because it involves the process of converting data into a coded form, which requires additional computational resources. This process adds a layer of security by making the data unreadable to unauthorized individuals. However, it also introduces a delay in the transmission and retrieval of data, resulting in slower browsing speeds compared to unencrypted connections.

    Rate this question:

  • 13. 

    One characteristic of Crash and instance recovery is that they 

    • A.

      Redo the changes using the current online data files

    • B.

      Use instance control

    • C.

      Process information in orderly manner

    • D.

      Check when a photo is uploaded

    Correct Answer
    A. Redo the changes using the current online data files
    Explanation
    Crash and instance recovery involve redoing the changes using the current online data files. This means that in the event of a crash or failure, any changes that were made but not yet saved will be re-executed using the most up-to-date data available. This ensures that the system remains consistent and any lost or uncommitted changes are recovered. By redoing the changes using the current online data files, the system can restore itself to a consistent state and minimize data loss.

    Rate this question:

  • 14. 

    The term “virus” is a general term that actually applies to three different kinds of malicious programs listed below except 

    • A.

      Zombies

    • B.

      Hackers

    • C.

      Trojan Horse

    • D.

      Worms

    Correct Answer
    B. Hackers
    Explanation
    The term "virus" is a general term used to describe malicious programs, but it does not apply to hackers. Hackers are individuals who gain unauthorized access to computer systems or networks with the intention of stealing or manipulating data, causing disruption, or committing other illegal activities. While hackers can use viruses as tools, they are not a type of virus themselves. The other options listed, zombies, Trojan Horse, and worms, are all types of malicious programs that can be considered viruses.

    Rate this question:

  • 15. 

    A __________ is a program that is designed to replicate and spread throughout a computer system 

    • A.

      Worm

    • B.

      Trojam Horse

    • C.

      Zombies

    • D.

      Hackers

    Correct Answer
    A. Worm
    Explanation
    A worm is a type of program that is specifically created to replicate and spread itself throughout a computer system. Unlike viruses, worms do not require a host file or program to attach themselves to. Instead, they can independently move across networks and systems, exploiting vulnerabilities to propagate and infect other devices. Worms can cause significant damage by consuming system resources, slowing down networks, and potentially compromising sensitive information.

    Rate this question:

  • 16. 

    Which of these options is not amongst the characteristics of index

    • A.

      Identify documentary units that treat particular topics or possess particular features

    • B.

      Restrict access to topics or features using the terminology of prospective users

    • C.

      Provide access through synonymous and equivalent terms

    • D.

      Use terminology that is as specific as documentary units warrant and the indexing language permits

    Correct Answer
    B. Restrict access to topics or features using the terminology of prospective users
    Explanation
    The given options describe the characteristics of an index. The first option states that an index helps identify documentary units that treat particular topics or possess particular features. The second option suggests that an index restricts access to topics or features using the terminology of prospective users. The third option mentions that an index provides access through synonymous and equivalent terms. The fourth option states that an index uses terminology that is as specific as documentary units warrant and the indexing language permits. Out of these options, the one that is not amongst the characteristics of an index is "restrict access to topics or features using the terminology of prospective users." An index does not restrict access based on the terminology used by prospective users; instead, it aims to provide access through synonymous and equivalent terms.

    Rate this question:

  • 17. 

    Indexes in database is necessary since it 

    • A.

      it makes search queries much faster

    • B.

      Duplicates row data

    • C.

      reduce searching against even large amounts of text located in any field indexed as such

    • D.

      Restrict users with an effective and systematic means for locating documentary that are relevant to information needs or requests

    Correct Answer
    A. it makes search queries much faster
    Explanation
    Indexes in a database are necessary because they make search queries much faster. By creating an index on a specific column or set of columns, the database can locate the required data more efficiently. Instead of scanning the entire table, the database engine can use the index to quickly narrow down the search to the relevant rows. This significantly improves the performance of search operations, especially when dealing with large amounts of data.

    Rate this question:

  • 18. 

    The database that can do multiple tasks in parallel allowing the database to make use of multiple CPU cores and multiple disks that are standard for modern database servers is

    • A.

      Parallel database

    • B.

      Distributed database

    • C.

      Instance recovery

    • D.

      Crash recovery

    Correct Answer
    A. Parallel database
    Explanation
    A parallel database is designed to perform multiple tasks simultaneously, utilizing the multiple CPU cores and disks available in modern database servers. This allows for faster processing and improved performance. Unlike a distributed database that is spread across multiple nodes, a parallel database operates on a single node but can execute tasks in parallel, making it an efficient choice for handling large amounts of data and complex queries. Instance recovery and crash recovery are not directly related to the ability of a database to perform tasks in parallel.

    Rate this question:

  • 19. 

    A suite of tools that can be used to support the ability to identify and report on fraudulent, illegal or other undesirable behaviour, with minimal impact on user operations and productivity is known as

    • A.

      Database

    • B.

      DBAMS

    • C.

      Database Activity Maintenance

    • D.

      Database Activity Monitoring

    Correct Answer
    D. Database Activity Monitoring
    Explanation
    Database Activity Monitoring refers to a suite of tools that can be used to identify and report on fraudulent, illegal, or undesirable behavior within a database system. These tools are designed to minimize the impact on user operations and productivity while providing effective monitoring and reporting capabilities. By continuously monitoring database activities, such as queries, transactions, and user access, organizations can detect and respond to any suspicious or unauthorized activities promptly. Database Activity Monitoring helps enhance security and compliance by ensuring the integrity and confidentiality of sensitive data.

    Rate this question:

  • 20. 

    Normal index is also known 

    • A.

      Unique index

    • B.

      Primary key index

    • C.

      Ordinary index

    • D.

      Normal index also known

    Correct Answer
    C. Ordinary index
    Explanation
    The correct answer is "ordinary index" because a normal index is also referred to as an ordinary index. It is a type of index that improves the efficiency of data retrieval operations by creating a separate data structure that allows for faster searching and sorting of data in a database table.

    Rate this question:

  • 21. 

    People prefer peer-to-peer network to client-server because of it

    • A.

      Is easy to set up

    • B.

      Is less expensive to install

    • C.

      Does require a server

    • D.

      Demands a moderate level of skill to administer the network

    Correct Answer
    C. Does require a server
    Explanation
    The correct answer is "does require a server." This is because in a client-server network, a dedicated server is required to manage and control the network. However, in a peer-to-peer network, there is no need for a central server as all devices in the network can act as both clients and servers. This makes peer-to-peer networks easier to set up and less expensive to install compared to client-server networks.

    Rate this question:

  • 22. 

    Some common features of Trojan horse programs include 

    • A.

      Causing payment triggers

    • B.

      Helping users to login easily

    • C.

      Withdrawing money from ATM

    • D.

      Creating a website

    Correct Answer
    A. Causing payment triggers
    Explanation
    Trojan horse programs are malicious software that disguise themselves as legitimate programs to deceive users. One common feature of such programs is causing payment triggers, which means they can initiate unauthorized transactions or manipulate payment systems to steal money from victims. These programs exploit vulnerabilities in the system to carry out financial fraud or gain unauthorized access to sensitive information. By causing payment triggers, Trojan horse programs can deceive users into unknowingly making payments or transferring funds, resulting in financial losses.

    Rate this question:

  • 23. 

    One advantage of distributed database is that it (a)  (b) (c)

    • A.

      Reflects organizational structure.

    • B.

      Manages other recovery

    • C.

      distributes other recovery reduce reliability and availability

    • D.

      None of the above

    Correct Answer
    A. Reflects organizational structure.
    Explanation
    Distributed databases have the advantage of reflecting the organizational structure. This means that the data is organized and distributed in a way that aligns with the structure of the organization. This can make it easier to access and manage the data, as it is organized in a way that mirrors the different departments or divisions within the organization. This can also help to improve efficiency and collaboration within the organization, as the data is structured in a way that is familiar and intuitive to the users.

    Rate this question:

  • 24. 

    A ________________ is a single logical database that is spread physically across computers in multiple locations that are connected by a data communications network

    • A.

      Incomplete database

    • B.

      Distributed database.

    • C.

      Parallel database

    • D.

      Complete database

    Correct Answer
    B. Distributed database.
    Explanation
    A distributed database refers to a single logical database that is physically spread across multiple computers in different locations, connected by a data communications network. This allows for data to be stored and accessed from various locations, providing improved scalability, fault tolerance, and performance. Unlike an incomplete database, which suggests missing or incomplete data, a distributed database is a complete database that is distributed across multiple locations for better efficiency. It is not a parallel database, which refers to a type of database that processes queries simultaneously using multiple processors.

    Rate this question:

  • 25. 

    The type of network where all computers have the same status is known as

    • A.

      status network

    • B.

      Client

    • C.

      Server

    • D.

      Peer-to-peer

    Correct Answer
    D. Peer-to-peer
    Explanation
    A peer-to-peer network is a type of network where all computers have the same status. In this network, each computer can act as both a client and a server, allowing for direct communication and sharing of resources between computers without the need for a central server. This decentralized structure promotes equal status and autonomy among all computers in the network.

    Rate this question:

  • 26. 

    _____________ is the term used by hackers to describe computers that have been infected by a class of virus that allows the hacker to control the workstation remotely

    • A.

      Spamming

    • B.

      Viruses

    • C.

      Trojan horse

    • D.

      Zombies

    Correct Answer
    D. Zombies
    Explanation
    Zombies is the term used by hackers to describe computers that have been infected by a class of virus that allows the hacker to control the workstation remotely. This term is derived from the concept of a zombie army, where multiple infected computers are used by the hacker to carry out coordinated attacks or spamming activities without the knowledge of the computer owners. The infected computers become part of a botnet and can be used for various malicious purposes, such as launching DDoS attacks or sending out spam emails.

    Rate this question:

  • 27. 

    The kind of virus that can prevent you from being able to boot your hard disk is 

    • A.

      Booting virus

    • B.

      File virus

    • C.

      Boot sector virus

    • D.

      Stealth virus

    Correct Answer
    C. Boot sector virus
    Explanation
    A boot sector virus is a type of virus that infects the boot sector of a computer's hard disk. The boot sector is responsible for loading the operating system when the computer is turned on. When infected with a boot sector virus, the computer may fail to boot or encounter errors during the booting process. This type of virus can prevent the computer from starting up properly, making it impossible to access the files and data stored on the hard disk.

    Rate this question:

  • 28. 

    The ______________ also controls the network access of the other 

    • A.

      Status network

    • B.

      Client

    • C.

      Server

    • D.

      Peer-to-peer

    Correct Answer
    C. Server
    Explanation
    The server controls the network access of the other devices or clients. It acts as a central hub and manages the network resources, granting or denying access based on predefined rules and permissions. The server ensures that the network operates efficiently and securely by regulating the flow of data and managing user authentication and authorization.

    Rate this question:

  • 29. 

    What among the following devices is not a network device

    • A.

      NIC

    • B.

      Keyboard

    • C.

      Cable

    • D.

      Switch

    Correct Answer
    B. Keyboard
    Explanation
    A keyboard is not a network device because it is an input device used for typing and entering data into a computer system. It does not have the capability to connect to a network or transmit data over a network. On the other hand, NIC (Network Interface Card), cable, and switch are all network devices. A NIC is used to connect a computer to a network, a cable is used to transmit data between network devices, and a switch is used to connect multiple devices within a network.

    Rate this question:

  • 30. 

    This type of network can also be seen in the bank where workers have access to the client and only a few managers have access to the server is known as 

    • A.

      Status network

    • B.

      Client - server

    • C.

      Wireless Network

    • D.

      Peer-to-peer

    Correct Answer
    B. Client - server
    Explanation
    A client-server network is a type of network where clients, such as bank workers, have access to the client side and can interact with it, while only a few managers have access to the server side. In this network, clients request services or resources from the server, which provides them. This type of network architecture is commonly used in organizations where centralized control and management of resources is necessary, and access to sensitive information needs to be restricted to a select few.

    Rate this question:

  • 31. 

    The need for creating a school network is because of its

    • A.

      Services

    • B.

      Modem

    • C.

      Router

    • D.

      Switch

    Correct Answer
    A. Services
    Explanation
    The need for creating a school network is primarily driven by the services it offers. A school network allows for the sharing of resources, such as printers and files, among different devices connected to the network. It also enables communication and collaboration between students and teachers through email, messaging, and video conferencing. Additionally, a school network provides internet access to support research, online learning platforms, and educational websites. Therefore, the services provided by a school network are essential for facilitating efficient communication, resource sharing, and access to educational resources.

    Rate this question:

  • 32. 

    One of these is not a computer professional

    • A.

      Computer education

    • B.

      Computer engineer

    • C.

      Computer wizard

    • D.

      Computer scientist

    Correct Answer
    C. Computer wizard
    Explanation
    The term "computer wizard" is not typically used to describe a computer professional. While computer education, computer engineer, and computer scientist are all professions related to computers, a computer wizard is more commonly associated with someone who has exceptional skills or knowledge in using computers, but may not necessarily work in a professional capacity in the field.

    Rate this question:

  • 33. 

    One of these is not part of the scenarios necessitate media recovery

    • A.

      You restore a backup of a datafile

    • B.

      You restore a backup control file (even if all datafiles are current)

    • C.

      The datafile is taken offline

    • D.

      Datafile is a security itself

    Correct Answer
    D. Datafile is a security itself
    Explanation
    The given answer suggests that "datafile is a security itself" is not part of the scenarios that necessitate media recovery. This means that a datafile being a security itself does not require media recovery. The other scenarios mentioned, such as restoring a backup of a datafile or a backup control file, or taking a datafile offline, may require media recovery. However, without further context or information, it is difficult to fully understand the meaning of "datafile is a security itself" in this context.

    Rate this question:

  • 34. 

    A computer wizard is a person that has a vast knowledge in the area of information technology

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false because a computer wizard is not just someone with vast knowledge in the area of information technology. A computer wizard is actually a term used to describe someone who is exceptionally skilled or talented in using computers and technology. It goes beyond just having knowledge and encompasses a high level of expertise and proficiency in various aspects of computer systems, programming, troubleshooting, and problem-solving.

    Rate this question:

  • 35. 

    One is these is not a condition for performing incomplete recovery of the whole database (a)  (b) (c)  (d) .

    • A.

      Media failure destroys some or all of the online redo logs

    • B.

      A user error causes data loss, for example, a user inadvertently drops a table

    • C.

      You cannot perform complete recovery because an archived redo log is missing

    • D.

      You lose your current control file and cannot use a backup control file to open the database

    Correct Answer
    D. You lose your current control file and cannot use a backup control file to open the database
    Explanation
    Losing the current control file and not being able to use a backup control file to open the database is not a condition for performing incomplete recovery of the whole database. Incomplete recovery refers to recovering the database to a specific point in time, but not fully restoring it to its original state. The other options mentioned in the question are conditions that can lead to incomplete recovery, such as media failure destroying redo logs, user error causing data loss, or missing archived redo logs.

    Rate this question:

  • 36. 

    The components of computer network include all except (a) cables (b) switch (c) internet. (d) NIC

    • A.

      Cables

    • B.

      Switch

    • C.

      Internet

    • D.

      NIC

    Correct Answer
    C. Internet
    Explanation
    The components of a computer network typically include cables, switches, and NICs (Network Interface Cards). These components are essential for establishing connections and facilitating communication between devices in a network. The internet, however, is not considered a component of a computer network, but rather a global network of networks that connects millions of devices worldwide. Therefore, the correct answer is internet.

    Rate this question:

  • 37. 

    The database security that concerns the need to ensure that entire database is secured from external and internal system breaches is 

    • A.

      Confidentiality

    • B.

      Integrity

    • C.

      Authenticity

    • D.

      Availability

    Correct Answer
    A. Confidentiality
    Explanation
    Confidentiality is the correct answer because it refers to the protection of sensitive information from unauthorized access. In the context of database security, confidentiality ensures that the entire database is secured from external and internal system breaches, preventing unauthorized individuals or entities from accessing and viewing the data. This includes implementing access controls, encryption, and other security measures to protect the confidentiality of the database and its contents.

    Rate this question:

  • 38. 

    A computer has been infected by a virus when

    • A.

      The hard drive is filling up

    • B.

      battery is not lasting long

    • C.

      a program has not been installed

    • D.

      A mouse is easily destroyed

    Correct Answer
    A. The hard drive is filling up
    Explanation
    When the hard drive is filling up, it is an indication that the computer has been infected by a virus. Viruses often replicate and spread themselves by creating multiple copies of their code, which can quickly consume the available storage space on the hard drive. Therefore, a rapidly filling hard drive is a common symptom of a virus infection.

    Rate this question:

  • 39. 

    _________ indexes allow users to look up people’s names and find information about personal and family relationships (a) book (b) pictorial (c) genealogy (d) cumulative

    • A.

      Book

    • B.

      Pictorial

    • C.

      Genealogy

    • D.

      Cumulative

    Correct Answer
    C. Genealogy
    Explanation
    Genealogy indexes are specifically designed to help users look up people's names and find information about personal and family relationships. This type of index is commonly used in genealogical research to trace family histories and connections.

    Rate this question:

  • 40. 

    One can get virus through

    • A.

      Putting on the computer regularly

    • B.

      Switching on the computer near dusty environment

    • C.

      Cracked software

    • D.

      Using a flash for one computer

    Correct Answer
    C. Cracked software
    Explanation
    Using cracked software can lead to the installation of viruses on a computer. Cracked software refers to unauthorized copies of paid software that have been modified to bypass licensing restrictions. These cracked versions often contain hidden malware or viruses that can infect the computer when the software is installed. Therefore, downloading and using cracked software increases the risk of getting a virus on the computer.

    Rate this question:

  • 41. 

    We prefer WLAN to LAN because it is _______ 

    • A.

      Easier to browse

    • B.

      Faster that LAN

    • C.

      Easier to move workstations

    • D.

      Less expensive and do not require any setup

    Correct Answer
    C. Easier to move workstations
    Explanation
    The correct answer is "easier to move workstations" because WLAN (Wireless Local Area Network) allows for wireless connectivity, which means that workstations can be easily moved around without the need for physical connections. In contrast, LAN (Local Area Network) typically requires wired connections, making it more difficult to move workstations without additional setup.

    Rate this question:

  • 42. 

    To protect your system against virus, we should do the following except

    • A.

      Run antivirus software recommended from the information security division of organization and make sure that version is current and the lates

    • B.

      Don’t open macros attach files from unknown email. Delete these attachments immediately

    • C.

      Delete spam, chain, and other junk email without forwarding

    • D.

      Download files or email attachments from unknown or unauthorized sources

    Correct Answer
    D. Download files or email attachments from unknown or unauthorized sources
    Explanation
    Downloading files or email attachments from unknown or unauthorized sources can expose your system to potential viruses and malware. It is important to only download files from trusted and authorized sources to ensure the safety and security of your system. By avoiding this action, you can protect your system against potential threats and reduce the risk of virus infections.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 31, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 11, 2014
    Quiz Created by
    Arinzeprince
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.