Second Period Exam Bachillerato May 2010

30 Questions | Total Attempts: 46

SettingsSettingsSettings
Please wait...
Second  Period Exam Bachillerato May 2010

Choose the best answer.


Questions and Answers
  • 1. 
    It's a type of computer threat.
    • A. 

      Trojan horse

    • B. 

      Firewall

    • C. 

      Hotswappable

    • D. 

      Updates

    • E. 

      Windows toolbar

  • 2. 
    HTTP stands for:
    • A. 

      Hyper transfer text protocol

    • B. 

      Hyper text transfer process

    • C. 

      Hyper transferece total protocol

    • D. 

      Hyper text markup language

    • E. 

      Hyper text transfer protocol

  • 3. 
    Html stands for
    • A. 

      Hyper text transfer language

    • B. 

      Hyper text transfer lock

    • C. 

      Hyper technology transfer language

    • D. 

      Hyper text markup language

    • E. 

      Hyper text modified language

  • 4. 
    What's the name of this hardware?
    • A. 

      Floppy disk drive

    • B. 

      Hard drive

    • C. 

      Floppy disk

    • D. 

      Optical drive

    • E. 

      Flexible drive

  • 5. 
    It´s a collection of information gathered in tables and forms:
    • A. 

      Group

    • B. 

      Database

    • C. 

      Groupwise

    • D. 

      Hard drive

    • E. 

      My documents

  • 6. 
    It´s a type of compressed file:
    • A. 

      Pdf

    • B. 

      Xml

    • C. 

      Zip

    • D. 

      Comp

    • E. 

      Jar

  • 7. 
    Is a form of computer data storage. Today, it takes the form of integrated circuits that allow stored data to be accessed in any order (i.e., at random). "Random" refers to the idea that any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data.
    • A. 

      Static

    • B. 

      Dynamic

    • C. 

      ROM

    • D. 

      RAM

    • E. 

      DVD

  • 8. 
    He is a person who likes to spy in chat rooms
    • A. 

      Netiquette

    • B. 

      Spytech

    • C. 

      Social engineer

    • D. 

      Hacker

    • E. 

      Lurker

  • 9. 
    It´s a windows application that blocks access to unwanted programs and stablish privilegies to known programs.
    • A. 

      Firewall

    • B. 

      Firewire

    • C. 

      Firefox

    • D. 

      Firefighter

    • E. 

      Firedoor

  • 10. 
    It´s a known place or website that the user assigns in the favorites menu to have easy access to it later.
    • A. 

      Markup

    • B. 

      Notebookmark

    • C. 

      Notemark

    • D. 

      Bookmark

    • E. 

      Lurkmark

  • 11. 
    It´s a type of ISP (Internet Service Provider)
    • A. 

      DSL

    • B. 

      DHL

    • C. 

      UPS

    • D. 

      LEX

    • E. 

      IDE

  • 12. 
    It's a type of computer threat where a fake page takes the identity of another pushing the user to provide his password and username in order to send it to another computer.
    • A. 

      Lurking

    • B. 

      Spam

    • C. 

      Malware

    • D. 

      Computer assult

    • E. 

      Phishing

  • 13. 
    It's a system consisting on "0" and "1" only
    • A. 

      Decimal

    • B. 

      Binary

    • C. 

      Hexadecimal

    • D. 

      Cero one

    • E. 

      One cero

  • 14. 
    It's a type of software that allows you to transfer printed text to a text editor
    • A. 

      Roc

    • B. 

      Cor

    • C. 

      Dor

    • D. 

      Ocr

    • E. 

      Ord

  • 15. 
    It´s a relationship between two files through a word you can click on:
    • A. 

      Hyperlink

    • B. 

      Browser

    • C. 

      Related site

    • D. 

      Html

    • E. 

      Spam

  • 16. 
    It's a common error that appears when a page has not been found.
    • A. 

      202e

    • B. 

      602

    • C. 

      Error page loading

    • D. 

      404

    • E. 

      Sorry

  • 17. 
    It is designed to search for information on the World Wide Web. The search results are usually presented in a list of results and are commonly called hits. The information may consist of web pages, images, information and other types of files
    • A. 

      Search page

    • B. 

      Search lab

    • C. 

      Finding site

    • D. 

      Search engine

    • E. 

      Yellow pages

  • 18. 
    What´s the name of the microsoft application to create databases?
    • A. 

      Publisher

    • B. 

      One note

    • C. 

      Picture viewer

    • D. 

      Access

    • E. 

      Lotus

  • 19. 
    What´s number 49 in binary?
    • A. 

      001110

    • B. 

      100010

    • C. 

      011001

    • D. 

      101010

    • E. 

      110001

  • 20. 
    What´s number 88 in binary?
    • A. 

      0100111

    • B. 

      1011000

    • C. 

      1000111

    • D. 

      0101010

    • E. 

      010011

  • 21. 
    What´s number 33 in binary?
    • A. 

      011110

    • B. 

      100000

    • C. 

      100001

    • D. 

      101010

    • E. 

      000111

  • 22. 
    What is the name of the following cable?
    • A. 

      ATA

    • B. 

      PATA

    • C. 

      SATA

    • D. 

      FDD

    • E. 

      RED CABLE

  • 23. 
    What´s the name of this cable?
    • A. 

      HDMI

    • B. 

      ATX

    • C. 

      RJ45

    • D. 

      USB

    • E. 

      SUV

  • 24. 
    Unwanted email is also called:
    • A. 

      Phishing

    • B. 

      Trash

    • C. 

      Inbox

    • D. 

      Spam

    • E. 

      Outbox

  • 25. 
    Who created the first virus? 
    • A. 

      Engineers at the NASA

    • B. 

      Taliban members

    • C. 

      Bill gates

    • D. 

      Two brothers in Pakistan

    • E. 

      Steve Jobs

  • 26. 
    What is the name of the following device?
    • A. 

      LCD

    • B. 

      DSL

    • C. 

      PLS

    • D. 

      UPS

    • E. 

      CRT

  • 27. 
    What's the name of the following port?
    • A. 

      Serial

    • B. 

      Parallel

    • C. 

      Usb

    • D. 

      Hdmi

    • E. 

      Firewire

  • 28. 
    What type of device is this? 
    • A. 

      Output

    • B. 

      Input

    • C. 

      Both

  • 29. 
    Which symbols must be used in this fields?
    • A. 

      " " and ;

    • B. 

      ., and

    • C. 

      , and:

    • D. 

      . and .,

    • E. 

      " " and .,

  • 30. 
    What type of device is this?
    • A. 

      Input

    • B. 

      Output

    • C. 

      Both