Computer Awareness - SPLessons

Computer Awareness Practice Set

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

Computer Awareness Practice Set

shape Introduction

What is computer awareness? Computer Awareness is also dependent upon an individual's specific knowledge of computer hardware (including micro, mini and mainframe computers, and peripheral devices) and applications (such as information processing and information sharing).
“A Computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming“. Computers follow a generalized set of operations termed as programs. The programs enable the computers to perform an extremely wide range of tasks. Computers are now ubiquitous and are being used in every field of work. Thus, basic knowledge of computers and ability to operate a computer is now crucial for all job aspirants.
Computer Awareness also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. Computer Awareness Practice Set lists some of the important questions for preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  • History of Computers
  • Computer Fundamentals
  • Parts of a Computer System
  • Data Processing Cycle of a Computer
  • Computer Languages
  • Input Devices & Output Devices
  • Operating Systems
  • Database Management Systems
  • Microsoft Office
  • Keyboard Shortcuts
  • File Extensions
  • Networking and Internet
  • Computer Viruses
  • Important Abbreviations

shape Quiz

1.Computers that control processes, accept data in a continuous________
    A. data traffic pattern B. data highway C. infinite loop D. feedback loop

2. A language reflects the way people think mathematically is _______
    A. cross platform programming B. functional C. event driven programming D. 3GL business programming

3. A mistake in an algorithm that causes incorrect results is called a ________
    A. logical error B. syntax error C. procedural error D. compiler error

4. device for changing the connection on a connector to a different configuration is ___
    A. a converter B. a component C. an attachment D. an adapter

5. Technique that is used to send more than one call over a single line is
    A. Digital transmission B. Infrared transmission C. Streaming D. Multiplexing

6. Which of the following would you find on LinkedIn?
    A. Games B. Connections C. Chat D. Applications

7. The method of Internet access that requires a phone line, but offers faster access speeds than dial-up is the ____ Connection
    A. Cable access B. Satellite access C. Fiber optic service D. Digital Subscriber Line (DSL)

8. ________ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.
    A. Cyber crime B. Memory shaving C. Syn-flooding D. Software Piracy

9. A program either talk or music that is made available in digital format for automatic download over the internet is called a _________
    A. wiki B. broadcast C. vodcast D. podcast

10. A USB communication device that supports data encryption for secure wireless communication for notebook users is called a ____
    A. USB Wireless Network adapter B. wireless switch C. wireless hub D. router

11. The term "user interface" refers to _____
    A. What the user sees on the screen and how they can interact with it B. How the operating system responds to user commands C. the means by which the user interacts with the peripheral devices on the computer. D. None of these.

12. The connection between your computer at home and your local ISP is called ______
    A. the last mile B. the home stretch C. the home page D. the vital mile

13. _____ are attempts by individuals to obtain confidential information from you by falsifying their identity through e-mails.
    A. Phishing trips B. Viruses C. Phishing scams D. Spyware scams

14. ERP is an acronym for ________
    A. Enterprise Relationship planning B. Enterprise Resource planning C. Enterprise Reorder planning D. None.

15. Collecting personal information and effectively posing as another individual is known as the crime of ______
    A. spooling B. spoofing C. hacking D. identity theft

16. The signal that a computer is waiting for a command from the user is ______
    A. prompt B. event C. time slice D. interrupt

17. Physical security is concerned with protecting computer hardware from human tampering & natural disasters and ______ security is concerned with protecting software from unauthorized tampering or damage.
    A. data B. cyber C. internet D. metaphysical

18. Which ports connect special types of music instruments to sound cards?
    A. BUS B. CPU C. USB D. Musical Instrument Digital Interface (MIDI)

19. Where you are likely to find an embedded operating system?
    A. On a desktop operating system B. On a networked PC C. On a PDA D. On a Mainframe.

20. Which of the following places the common data elements in order from smallest to largest?
    A. Bit, byte, character, record, field, file, database B. Database, file, record, field, character C. Character, file, record, field, database D. Character, field, record, file, database

Answers
1. Answer - Option D
2. Answer - Option B
3. Answer - Option A
4. Answer - Option D
5. Answer - Option D
6. Answer - Option B
7. Answer - Option D
8. Answer - Option C
9. Answer - Option D
10. Answer - Option A
11. Answer - Option A
12. Answer - Option A
13. Answer - Option A
14. Answer - Option B
15. Answer - Option D
16. Answer - Option A
17. Answer - Option A
18. Answer - Option D
19. Answer - Option C
20. Answer - Option D
1. Which protocol provides e-mail facility among different hosts?
    A. File Transfer Protocol (FTP) B. TELNET C. Simple Mail Transfer Protocol (SMTP) D. Simple Network Management Protocol (SNMP)

2. Which of the following memory is non-volatile?
    A. DRAM B. SRAM C. ROM D. None of the above

3. What is embedded system?
    A. The programme which arrives by being wrapped in box. B. The programme which is the permanent part of the computer C. The computer which is the part of a big computer. D. Some combination of computer hardware and software.

4. Which device connects a LAN to the Internet ?
    A. Adapter B. Repeater C. Router D. None of the above

5. EBCDIC stands for
    A. Extended Binary Coded Decimal Interchange Code B. Extended Bit Code Decimal Interchange Code C. Extended Bit Case Decimal Interchange Code D. Extended Binary Case Decimal Interchange Code

6. The first general purpose electronic digital computer in the world was?
    A. UNIVAC (Universal Automatic Computer) B. EDVAC (Electronic Discrete Variable Automatic Computer) C. ENIAC (Electronic Numerical Integrator & Computer) D. EDSAC (Electronic Delay Storage Automatic Computer)

7. Signals can be analog or digital and a computer that processes the both type of signals is known as?
    A. Analog computer B. Digital Computer C. Hybrid Computer D. Mainframe Computer

8. Human beings are referred to as Homo sapiens, which device is called Silico Sapiens?
    A. Monitor B. Hardware C. Robot D. Computer

9.EBCDIC can code up to how many different characters?
    A. 256 B. 16 C. 32 D. 64

10. Different components of the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
    A. Conductors B. Buses C. Connectors D. Consecutive

11. Which is the first automatic electronic digital computer?
    A. ENIAC B. MARK I C. Z3 D. ABC (Atanasoff –Berry Computer)

12. India’s first supercomputer is
    A. Cyber 205 B. Aaditya C. Anupam D. PARAM 8000

13. The metal disks, which are permanently housed in, sealed and contamination free containers are called?
    A. Hard disks B. Floppy disk C. Winchester disk D. Flexible disk

14. What was the name of the first commercially available microprocessor chip?
    A. Intel 308 B. Intel 33 C. Intel 4004 D. Motorola 639

15. The first digital computer built with IC chips was known as
    A. IBM 7090 B. Apple - 1 C. IBM System / 360 D. VAX - 10

16. RATS stands for
    A. Regression Analysis Time Series B. Regression Analysis Time Sharing C. Real Analysis Series D. All of above

17. The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as
    A. Magnetic core memory B. Magnetic tape memory C. Magnetic disk memory D. Magnetic bubble memory

18. A computer program that converts an entire program into machine language is called a/an
    A. Interpreter B. Simulator C. Compiler D. Commander

19. A language translator that analyses and executes the source code in-line-by- line manner without looking at the entire program is called a/an
    A. Interpreter B. Simulator C. Compiler D. Commander

20. Who designed the first electronics computer (ENIAC)?
    A. Von Neumann B. John Eckert & John Mauchly C. Joseph M Jacquard D. None of the above

Answers
1. Answer - Option D
2. Answer - Option C
3. Answer - Option C
4. Answer - Option D
5. Answer - Option C
6. Answer - Option A
7. Answer - Option C
8. Answer - Option C
9. Answer - Option D
10. Answer - Option A
11. Answer - Option B
12. Answer - Option D
13. Answer - Option D
14. Answer - Option C
15. Answer - Option C
16. Answer - Option C
17. Answer - Option D
18. Answer - Option C
19. Answer - Option A
20. Answer - Option B
1. A device driver acts like a ________ between the device & OS
    A. inverter B. converter C. translator D. None

2. Computers can be divided into _______ major categories.
    A. Four ( Micro, Mini, Mainframe, Super) B. Three C. One D. None

3. SAN stands for
    A. Storage Area Network B. Super Array Network C. Shared Area Network D. None

4. NAS stands for
    A. Network Area Service B. Network Attached Storage C. Network Attached Service D. None

5. To produce high quality graphics (hardcopy) in color, _______ is used
    A. RGB monitor B. Plotter C. Ink-jet printer D. Laser printer

6. Hardware or software designed to guard against unauthorized access to a computer network is known as _____
    A. Hacker-proof program B. Firewall C. Hacker-resistant server D. None

7. The scrambling of code is known as
    A. Encryption B. a firewall C. Scrambling D. None

8. A type of message that web servers pass to your web browser when you visit the website
    A. Cache B. Spam C. None D. Cookie

9.Software that you can use free of charge for a set period. After that you have to buy it to keep working is known as
    A. Freeware B. Shareware C. Software D. None

10. A type of virus (malicious code) that looks for security loopholes in a system and uses that to replicate itself is known as
    A. Worm B. Threat C. Trojan Horse D. None

11. RAID stands for________
    A. Reproduce Array of Intelligent Disks B. Reproduce Array of Inexpensive Disks C. Redundant Array of Inexpensive Drives D. Redundant Array of Inexpensive Disks

12. Software that monitors your online computer activities is known as
    A. Malware B. Spyware C. Freeware D. None

13. Software that is made available at no cost and is sometimes used to entice a user to purchase the unbranded version with no advertising.
    A. Malware B. Spyware C. Freeware D. None

14. Which is used to display one or more web pages within another normal web page
    A. IFRAME B. Hyperlink C. Home page D. None

15. What is the main difference between a mainframe and a super computer?
    A. Supercomputer is much larger than mainframe computers B. Supercomputers are much smaller than mainframe computers C. Supercomputers are focused to execute few programs as fast as possible while mainframe uses its power to execute as many programs concurrently. D. None

16. storage area used to store data to a compensate for the difference in speed at which the different units can handle data is
    A. Memory B. Buffer C. Accumulator D. None

17. Computer is free from tiresome and boardroom. We call it
    A. Accuracy B. Diligence C. Versatility D. None

18.Integrated Circuits (ICs) are related to which generation of computers?
    A. First generation B. Second generation C. Third generation D. None

19.Which type of computers uses the 8-bit code called EBCDIC?
    A. Minicomputers B. Microcomputers C. Mainframe computers D. None

20. The ALU of a computer responds to the commands coming from
    A. Primary memory B. Control section C. External memory D. Cache memory

Answers
1. Answer - Option C
2. Answer - Option A
3. Answer - Option A
4. Answer - Option B
5. Answer - Option B
6. Answer - Option B
7. Answer - Option A
8. Answer - Option D
9. Answer - Option B
10. Answer - Option A
11. Answer - Option D
12. Answer - Option B
13. Answer - Option C
14. Answer - Option A
15. Answer - Option C
16. Answer - Option B
17. Answer - Option B
18. Answer - Option C
19. Answer - Option C
20. Answer - Option B
1. A physical connection between the microprocessor memory and other parts of the microcomputer is known as
    A. Path B. Address bus C. Route D. All of the above

2. A technique used by codes to convert an analog signal into a digital bit stream is known as
    A. Pulse code modulation B. Pulse stretcher C. Query processing D. Queue management

3. Before a disk drive can access any sector record, a computer program has to provide the record’s disk address. What information does this address specify?
    A. Track number B. Sector number C. Surface number D. All of above

4. What is the responsibility of the logical unit in the CPU of a computer?
    A. To produce result B. To compare numbers C. To control flow of information D. To do math’s works

5. The terminal device that functions as a cash register, computer terminal, and OCR reader is the?
    A. Data collection terminal B. OCR register terminal C. Video Display terminal D. POS terminal

6. A set of flip flops integrated together is called ____
    A. Counter B. Adder C. Register D. None of the above

7. A register organized to allow moving left or right operations is called a___
    A. Counter B. Loader C. Adder D. Shift register

8. How many address lines are needed to address each machine location in a 2048 x 4 memory chip?
    A. 10 B. 11 C. 8 D. 12

9. Multi user systems provided cost savings for small business because they use a single processing unit to link several
    A. Personal computers B. Workstations C. Dumb terminals D. Mainframes

10. The difference between memory and storage is that memory is _____ and storage is __
    A. Temporary, permanent B. Permanent, temporary C. Slow, fast D. All of the above

11. Which of the following is the first computer to use Stored Program Concept?
    A. UNIVAC B. ENIAC C. EDSAC D. None of above

12. 1 nibble equals to
    A.1 bits B. 2 bits C. 4 bits D. 8 bits

13. The most commonly used standard data code to represent alphabetical,numerical and punctuation characters used in electronic data processing system is called
    A. ASCII B. EBCDIC C. BCD D. All of the above

14. The term GIGO (Garbage In Garbage Out) is related to which characteristics of computers?
    A. Speed B. Automatic C. Accuracy D. Reliability

15. Hard disk is coated on both sides with
    A. Magnetic metallic oxide B. Optical metallic oxide C. Carbon layer D. All of the above

16. The contents of information are stored in
    A. Memory data register B. Memory address register C. Memory arithmetic registers D. Memory access register

17. The programs which are as permanent as hardware and stored in ROM is known as
    A. Hardware B. Software C. Firmware D. ROM ware

18. Which of the following memories must be refreshed many times per second?
    A. Static RAM B. Dynamic RAM C. EPROM D. ROM

19. In which mode, the communication channel is used in both directions at the same time?
    A. Full-duplex B. Simplex C. Half-duplex D. None of the above

20. Which of the printers used in conjunction with computers uses dry ink powder?
    A. Daisy wheel printer B. Line printer C. Laser printer D. Thermal printer

Answers
1. Answer - Option B
2. Answer - Option A
3. Answer - Option D
4. Answer - Option B
5. Answer - Option D
6. Answer - Option C
7. Answer - Option D
8. Answer - Option B
9. Answer - Option C
10. Answer - Option A
11. Answer - Option C
12. Answer - Option C
13. Answer - Option A
14. Answer - Option C
15. Answer - Option A
16. Answer - Option A
17. Answer - Option C
18. Answer - Option B
19. Answer - Option A
20. Answer - Option C
1. Daisy wheel printer is a type of
    A. Matrix printer B. Impact printer C. Laser printer D. Manual printer

2. Which of these is considered intelligent CASE tool?
    A. Workbench B. Toolkit C. Upper CASE D. Lower CASE

3. Origin of internet can be tracked from
    A. Satellite networks B. Radio networks C. ARPANET (Advanced Research Projects Agency Network) D. None

4. _______ is used by public & private enterprises to publish and share financial information with each other and industry analysts across all computer platforms & the Internet.
    A. Extensible Markup Language (XML) B. Extensible Business Reporting Language (XBRL) C. Enterprise Application Integration (EAI) D. None

5. System proposal is prepared in _________ phase of SDLC.
    A. Conception B. Initiation C. Analysis D. Design

6. A data warehouse
    A. Contains numerous naming conventions and formats B. Is organized around important subject areas C. Contains only current data D. None

7. “>” symbol in DOS commands is used to
    A. Compare two values B. Redirect Input C. Redirect Output D. None

8. To connect networks of similar protocols, ________ are used
    A. Routers B. Gateways C. Bridges D. None

9. _____ is one reason for problems of data integrity
    A. Data availability constraints B. Data inconsistency C. Data redundancy D. None

10. Which of the following is an advantage of mounting an application on the web?
    A. the possibility of 24-hour access for users B. creating a system that can extend globally C. standardizing the design of the interface D. All of these
11. Which of the following domains is used for profit businesses?
    A. .com B. .edu C. .net D. None

12. Which of the following domains is used for non-profit organizations?
    A. .org B. .edu C. .net D. None

13. Browsers can be classified into two types. They are
    A. Graphical & Text B. Graphical & Navigational C. Text & Pictorial D. None

14. The displayed data over internet can be classified into two types. They are
    A. Static & Dynamic B. Graphical & Text C. Data & Voice D. None

15. Which is an open source development environment to develop dynamic web pages?
    A. PHP (Hypertext Preprocessor) B. XML C. VB Script D. None

16. A protocol that allows a user to log on to a remote computer which is also known as remote login is_______
    A. FTP B. Telnet C. HTTP D. None

17. A set of rules that enables a user to log on to another computer and transfer information between it & his/ her computer.
    A. HTTP B. FTP C. WWW D. None

18. PSTN stands for
    A. Public Switched Transformation Network B. Public Switched Telephone Network C. Public Serviced Telnet Network D. None

19. Home Page is also known as
    A. Index Page B. Front Page C. Back Page D. None

20. GPRS stands for
    A. Global Packet Radio Service B. Global Positioning Radio Service C. General Packet Radio Service D. None

Answers
Answers
1. Answer - Option B
2. Answer - Option A
3. Answer - Option C
4. Answer - Option B
5. Answer - Option B
6. Answer - Option B
7. Answer - Option C
8. Answer - Option C
9. Answer - Option A
10. Answer - Option D
11. Answer - Option A
12. Answer - Option A
13. Answer - Option A
14. Answer - Option A
15. Answer - Option A
16. Answer - Option B
17. Answer - Option B
18. Answer - Option B
19. Answer - Option A
20. Answer - Option C
1. GSM stands for
    A. Global System for Mobile B. Global Service for Mobile C. Global System for Mobile communication D. None

2. TCP stands for
    A. Transmission Control Protocol B. Telnet Control Protocol C. Transmission Channel Protocol D. None

3. Proprietary Software is also called as
    A. Closed Source Software B. Open Source Software C. Commercial Software D. None

4. A product that is owned exclusively by a single company that can only function properly, if it is used with other products owned by the same company?
    A. Proprietary Software B. Public Domain Software C. Commercial Software D. None

5. Freeware can be classified into four types. It includes
    A. Donation-ware, Postcard-ware B. Abandon-ware, Adware C. Both (A) & (B) D. None

6. Which of the following activity can be termed as software piracy?
    A. Soft loading B. Counterfeiting C. Renting D. All of these

7. Linux is a type of _________ Software
    A. Open Source B. Public Domain C. Commercial D. None

8. A coding language that is compatible with windows servers which is used for increased functionality on a website or to work with a database
    A. HTML B. ASP C. XML D. None

9. A code that represents English characters as numbers and ranging from 0 to 127.
    A. ASCII B. EBCDIC C. BCD D. All of above

10. An email feature, which is used to send a copy of an email to one or many other people at the same time that you are sending it to the main recipient/s is called
    A. CC B. BCC C. TO D. None

11. An email feature which is used to send someone a BCC email, their email address will not show in the "to" field
    A. CC B. BCC C. CC & BCC D. None

12. GUI stands for
    A. Graphic Uninstall/Install B. Graphical User Interface C. General Utility Interface D. None

13. A ______ is a design tool that graphically shows the logic in a solution algorithm.
    A. Hierarchy Chart B. Flow Chart C. Structure Chart D. None

14. Programs designed to perform specific tasks related to managing computer resources are called
    A. System Software B. Utility Software C. Application Software D. None

15. A file that contains definitions of the paragraph and character styles for your document and all things you customized like toolbars and menus is called a ______
    A. guide B. prompt C. template D. None

16. Programs designed specifically to address general purpose applications & special-purpose applications are called
    A. System Software B. Application Software C. Operating System D. None

17. A ________ contains buttons & menus that provide quick access to commonly used commands.
    A. menubar B. toolbar C. window D. None

18. What is the split – MAC Architecture?
    A. The split-MAC architecture uses MAC addresses to create a forward/filter table and break up collision domains. B. The split-MAC architecture uses MAC addresses to create a forward/fliter table C. Both (A) & (B) D. None

19. In ______ normal form, all non-key fields of data structure are dependent on the whole key.
    A. First B. Second C. Third D. None

20. Which of the following are tasks that may be completed when configuring your e-mail client?
    A. Provide the IP address of your ISP’s mail server B. Provide the IP address of your ISP’s mail server C. All of these D. None of these

Answers
1. Answer - Option C
2. Answer - Option A
3. Answer - Option A
4. Answer - Option A
5. Answer - Option C
6. Answer - Option D
7. Answer - Option A
8. Answer - Option B
9. Answer - Option A
10. Answer - Option A
11. Answer - Option B
12. Answer - Option B
13. Answer - Option B
14. Answer - Option B
15. Answer - Option C
16. Answer - Option B
17. Answer - Option B
18. Answer - Option A
19. Answer - Option B
20. Answer - Option A
1. A pixel is a _____
    A. picture element or dot on a screen B. point of ink on a laser printed page C. point of ink on an ink jet printed page D. None

2. Expansion cards are inserted into
    A. CPU B. Slots C. Peripheral devices D. None

3. ____ is a communication technology used by some incoming mail servers.
    A. TCP B. POP3 C. FTP D. None

4. Which of the following format for storing & backing up computer data on tape that evolved from Digital Audio Tape (DAT) technology?
    A. Data Aggregation B. Digital Data Storage C. Virtual Tape System D. None

5. The two basic parts of URLs are
    A. TCP & IP B. the protocol & the domain name C. TCP & FTP D. None

6. The storage locations in the internal storage of a CPU is called
    A. reference points B. addresses C. locations D. None

7. The ______ database is the most widely used database structure
    A. General B. Standard C. Relational D. None

8. Mail from unwanted senders can be blocked by ____
    A. e-mailing them & asking to be removed from the list B. using mail filters C. clicking the unsubscribe link D. None

9. ATM machines run _______ OS
    A. Open Source B. Closed Source C. embedded D. None

10. Which of the following is possible with open architecture?
    A. Hot swapping of devices B. A minimum of six new devices to be added to a computer C. Users to upgrade and add new devices as they come on the market D. None

11. The fraudulent practice of sending emails purposing to be from reputable companies in order to induce individuals to reveal personal information(Credit & Debit card details) is called
    A. Hot swapping of devices B. Pharming C. Phishing D. None

12. NIC stands for
    A. Network Internal Card B. Network Interconnection Channel C. Network Interface Card D. None

13. ____ Is the Virus that overwrites the files or a few parts being replaced?
    A. Virus B. File infectors C. worm D. None

14. A dynamic website that is normally database driven and which enables the owner/user to manage the content of their own website without needing to know any coding at all is known as
    A. Content Management System (CMS) B. ASP C. DNS D. None

15. An Internet service that translates domain names to the IP addresses is called
    A. CMS B. ASP C. DNS D. None

16. A hacker installs malicious code on a personal computer or server. This code then redirects clicks you make on a Web site to another fraudulent Web site without your consent or knowledge. It is known as _____
    A. Phishing B. Smishing C. Pharming D. None

17. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
    A. Pharming B. Smishing C. Vishing D. None

18. A type of phishing attack where mobile phone users receive text messages containing a Web site hyperlink is called
    A. Pharming B. Smishing C. Vishing D. None

19. The creation of Internet Protocol (IP) packets with a forged source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system is called _______
    A. Pharming B. Spoofing C. Vishing D. None

20. A malware program that can be used by a black hat cracker to remotely take control of a system for further attacks like spam emails or Denial of Service attacks, without a user’s knowledge is called _________
    A. Zombie B. Spoofing C. Vishing D. None

Answers
1. Answer - Option A
2. Answer - Option B
3. Answer - Option B
4. Answer - Option B
5. Answer - Option B
6. Answer - Option B
7. Answer - Option C
8. Answer - Option B
9. Answer - Option C
10. Answer - Option C
11. Answer - Option C
12. Answer - Option C
13. Answer - Option B
14. Answer - Option A
15. Answer - Option C
16. Answer - Option C
17. Answer - Option C
18. Answer - Option B
19. Answer - Option B
20. Answer - Option A
1. Ethical hackers who use their skill to secure the integrity of computer systems or networks is called
    A. Black Hat B. White Hat C. Green Hat D. None

2. A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system's Operating System has completely booted up is called
    A. Phishing B. Rootkits C. Pharming D. None

3. Spam over instant messenger is called spim while spam over Internet telephony is known as
    A. Malware B. Spit C. Pharming D. None

4. The unauthorized activities of malicious software is called
    A. Pharming B. Payload C. Phishing D. None

5. Unauthorized access to restricted systems or resources is referred as
    A. Pharming B. Penetration C. Phishing D. None

6. Unauthorized access to information by using a terminal that is already logged on with an authorized ID is called
    A. Piggybacking B. Penetration C. Phishing D. None

7. Modifying data in a Domain Name System (DNS) server so that calls to particular Websites or even entire domains are misdirected for fraudulent purposes is termed as
    A. DNS cache poisoning B. Penetration C. Phishing D. None

8. Any deliberate damage to operations or equipment's is called
    A. Piggybacking B. Sabotage C. Phishing D. None

9. Sending large numbers of unwanted e-mail messages to a single recipient or to a group of such recipients is termed as
    A. Logic bomb B. Mail bombing C. Time bomb D. None

10. Malicious modification or destruction of data such as changing information on Web sites is called
    A. Super zapping B. Vandalism C. Spamming D. None

Answers
1. Answer - Option B
2. Answer - Option B
3. Answer - Option B
4. Answer - Option B
5. Answer - Option B
6. Answer - Option A
7. Answer - Option A
8. Answer - Option B
9. Answer - Option B
10. Answer - Option B