Please wait...

Computer Knowledge Test 66
Menu grid icon
Result Result point icon
Computer Knowledge Test 66
  • Goals icon

    /

    Score
  • Trophy icon

    -

    Rank
White alarm icon Time Taken: -
Result frame illustration
  • Question 1/10
    1 / -0

    Junk e-mail is also called as ______.

    Solutions

    Email spam, also known as junk email or unsolicited bulk email(UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.

     

  • Question 2/10
    1 / -0

    Software such as viruses, worms and Trojan horses that has a malicious content is known as _____.

    Solutions

    Two of the most common types of malware are viruses and worms. These types of programs are able to self-replicate and can spread copies of themselves, which might even be modified copies.

    Note:- malware must have the ability to propagate. The difference is that a worm operates more or less independently of other files, whereas a virus depends on a host program to spread itself. These and other classes of malicious software are described below.

     

  • Question 3/10
    1 / -0

    Which of the following is used by the browser to connect to the location of the Internet resources?

    Solutions

    URL is an acronym for Uniform Resource Locator and is a reference (an address) to a resource on the Internet. A URL has two main components: Protocol identifier: For the URL https://anyone.co , the protocol identifier is http.

     

  • Question 4/10
    1 / -0

    Specialised programs that assist users in locating information on the Web are called_____.

    Solutions

    Search engines are the programs that search documents for specified keywords and return a list of the documents where the keywords were found. A web search engine is a software system that is designed to search for information on the World Wide Web. 

    Note:- Google and Yahoo are the major search engines used throughout the World.

  • Question 5/10
    1 / -0

    ______ services are available free at portals on the Web.

    Solutions

    Electronic mail, most commonly referred to as email or e-mail since around 1993, is a method of exchanging digital messages from an author to one or more recipients. Email operates across the Internet or other computer networks.

     

  • Question 6/10
    1 / -0

    A program designed to destroy data on your computer which can travel to "infect" other computers is called a___.

    Solutions

    A program designed to destroy data on your computer which can travel to "infect" other computers is called a virus

    Note:- It is a harmful activity on infected hosts even rendering the computer useless.

     

  • Question 7/10
    1 / -0

    An educational institution would generally have the following in its domain name____.

    Solutions

    An educational institution would generally have the following in its domain name .edu . The domain name edu is a sponsored top-level domain in the Domain Name System of the Internet. 

     

  • Question 8/10
    1 / -0

    The process of a computer receiving information from a server on the Internet is known as _____.

    Solutions

    In computer networks, to download means to receive data to a local system from a remote system or to initiate such a data transfer. Examples of a remote system from which a download might be performed include a web server, FTP server, email server, or other similar systems.

     

  • Question 9/10
    1 / -0

    ______ are often delivered to a PC through an email attachment and are often designed to do harm.

    Solutions

    Viruses are often delivered to a PC through an email attachment and are often designed to do harm.

    Note:- A computer virus is a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected".

     

  • Question 10/10
    1 / -0

    Coded entries which are used to gain access to a computer system are called ____.

    Solutions

    Password is a type of protection which contains code to access. 

    Note: A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource.

     

Close button icon
User Profile
-

Correct (-)

Wrong (-)

Skipped (-)


  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
Mockers logo Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Arrow pointer icon
Click on Allow to receive notifications
Notification bell icon ×
Open Now