Exam 11: Technology Terminology and Concepts

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

-------- uses the principles and tools of computer science to model or algorithmically specify complexes biological information system and computational systems with life-like capabilities.

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

C

A backup is a ...................... against data loss a.Threat b. Security c. Countermeasure d. Abuse 111. What is malware?

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

B

Britannica is a

Free
(Multiple Choice)
5.0/5
(44)
Correct Answer:
Verified

A

Broadband connections includes

(Multiple Choice)
4.7/5
(35)

ICQ is related with

(Multiple Choice)
4.8/5
(34)

------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

(Multiple Choice)
5.0/5
(44)

What is the first step in protecting yourself from identity theft?

(Multiple Choice)
4.9/5
(26)

Which of the following is a step that all computer users should take to protect against virus attacks?

(Multiple Choice)
4.8/5
(35)

------- can be referred as the use or application of computational devices in the field of biological sciences and research.

(Multiple Choice)
4.8/5
(34)

Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

(Multiple Choice)
4.9/5
(36)

Computers are programmed to make decisions in real-life situations are known as

(Multiple Choice)
4.8/5
(24)

When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

(Multiple Choice)
5.0/5
(43)

How could hacker use information about you found through Internet searches?

(Multiple Choice)
4.8/5
(41)

Why do you not want too much personal data about you on the Internet?

(Multiple Choice)
4.8/5
(32)

------ uses software to allow people to interact with three-dimensional simulated environment.

(Multiple Choice)
4.9/5
(36)

Google earth is --------

(Multiple Choice)
4.8/5
(39)

This unlawful acts wherein the computer is either a tool or target or both

(Multiple Choice)
4.9/5
(33)

Which of the following is annoying, but really doesn't render any harm to our computer?

(Multiple Choice)
4.8/5
(28)

INFLIBNET is

(Multiple Choice)
4.8/5
(39)

Which among shows IT for national integration

(Multiple Choice)
4.8/5
(35)
Showing 1 - 20 of 24
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)