___ Layer formats the data to be presented to application layer. It can be viewed as the translator for the network
PresentationCorrect
____ Layer is concerned with the transmission and reception of the unstructured raw bit stream over the physical medium
PhysicaCorrect
_____ Layer allows session establishment between processes running on different stations
SessionCorrect
_____ Layer ensures that message are delivered error-free in sequence and with no losses or duplications.
TransportCorrect
_____ Million of Windows 8 licenses have been sold through January 2013, a number which includes both upgrades and sales to OEM for new PCs.
60Correct
______ Layer controls the operations of the subnet, deciding which physical path the data takes.
NetworkCorrect
________ is a collection of many separate networks
None of the above
A LAN
A WAN
AN InternetCorrect
A ___ mobile operating s is a software that allows smartphones, tablet PCs and other devices to run applications and programs
mobile operating systemCorrect
A college student in Finland,______, developed a version of UNIX as an operating system for personal computer. He called it Linux
Linus TorvaldsCorrect
A maintenance utility included in Microsoft Windows that is used to free up disk spaces on the computer hard drive.
Disk CleanupCorrect
A series of rules that your databases table structure must pass in order to be considered a good relational design.
NormalizationCorrect
A special type of software that is used to hide malware, bots and worms. This software should be installed in the target computer
Rootkits Correct
A Type of Network that is being utilized nowadays by individuals for their homes and apartments. This network allows all users to connect and share resources.
Home NetworkCorrect
A Type of Wireless Area Network that works within a very small area – your immediate surroundings.
Local Area Network
Personal Area NetworkCorrect
A type of wireless transmission that uses electromagnetic waves to transmit data through air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per second.
Radio FrequencyCorrect
ANSI stands for ______
American National Standards InstituteCorrect
Aspect Ratio is the distance between each pixel
FalseCorrect
Blu-ray Disc is the next generation optical disc that can hold high-definition video due to its high capacity
TrueCorrect
Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that no errors exist before loading the operating system.
FalseCorrect
Build the first computer that does simultaneous solving of equations
1911Correct
Co-Processor is a special set of circuits in a micro-processor chip that is designed to manipulate numbers or perform some other specialized function more quickly than the basic microprocessor circuits.
True Correct
Computer Security is very important to learn because it enables the people to carry out their jobs, education and research, it supports critical business process and lastly it protects personal and sensitive information
True Correct
Computing has 4 steps, they are:
input, process, output, storeCorrect
Control Unit performs two operations (arithmetic and logical)
FalseCorrect
Convert this (2BCD)16 value to decimal Select the correct answer -
(11413)10
(21213)10
(11211)10
(11213)10Correct
Copywright is a legal right credited by law of a country that grants the creator of an original work exclusive rights to its use and distribution, usually for a limited time.
FalseCorrect
Designs the Punch Card System
1890Correct
Desktop Computer is a personal computer which can be moved easily and used in a variety of locations.
TrueCorrect
English Mathematician and Father of Computing
1800Correct
Expansion Slots is a mechanical components that provides mechanical and electrical connections between a microprocessor and a printed circuit board (PCB).
FalseCorrect
Fedora is a____ based operating system developed and supported by the Fedora Project as a partnership with Red Hat and volunteer contributors.
LinuxCorrect
Firewall is the process of converting a data or information into another form also known as cipher text.
FalseCorrect
Grace Hopper develops the first computer language
1953Correct
Graphical User Interface ( GUI) has made computers easier to use because:
they used icons instead of commandsCorrect
Hardware are the equipment used to process the data and create useful information.
TrueCorrect
Honey Pot is a software application that scans your whole computer’s hard drives and folders for possible malware or virus infections.
False Correct
How do you explain the CPU (Central Processing Unit) inside a computer?
The brain of the computerCorrect
How many layers are there in the OSI reference model?
4
6
5
7Correct
IEEE stands for _____
Institute of Electrical and Electronics EngineerCorrect
In terms of the size of the network the correct order (ascending) is -
LAN, MAN, WAN, PAN
PAN, MAN, LAN, WAN
PAN, LAN, MAN, WANCorrect
LAN, PAN, MAN, WAN
Information is the result of processing a raw data.
TrueCorrect
Information System is an integrated set of components for collecting, storing, and processing data and for delivering information, knowledge and digital products.
True Correct
Information Technology involves the development, maintenance and use of computer systems, software and networks for the processing and distribution of data.
TrueCorrect
Is a meta-network and constantly changing collection of thousands of individual networks intercommunicating with a common protocol?
ArchitectureCorrect
is an open source Debian-based Linux distribution sponsored by Canonical Ltd.
UbuntuCorrect
It is a category of Application Software that allows the user to create and manage information, usually for individual projects within a department, in contrast to enterprise management.
Information Worker Software Correct
It is a category of Application Software that are originally offered for general productivity and information retrieval including email, calendar, contacts, stock market and weather information
Mobile ApplicationsCorrect
It is a category of Application Software that generates print and electronic media for other to consume, most often in a commercial or educational settings.
Media Development SoftwareCorrect
It is a category of Application Software that is related to content access software but has the content and/or features adapted for use in by educators or students.
Educational SoftwareCorrect
It is a category of Application Software that is used in developing hardware and software products.
Product Engineering SoftwareCorrect
It is a category of Application Software that is used primarily to access a content without editing but may include software that allows for content editing.
Content Access SoftwareCorrect
It is a category of Application Software that provide common capabilities needed to support enterprise software systems.
Enterprise Infrastructure Software Correct
It is a category of Application Software that run applications for amusement, leisure, or as a diversion.
Entertainment SoftwareCorrect
It is a category of Application Software that simulates physical or abstract system for research, training or entertainment purposes
Simulation SoftwareCorrect
It is a collection of individual data items that are stored in a highly structured way that represetnts a model of reality
DatabaseCorrect
It is a combination of hardware and software, which enables information sharing between computer devices.
networkCorrect
It is a distributed communication framework of network process among service requestors, clients and service providers
Client-Server ModelCorrect
It is a model that provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This model is maintained by the IETF.
TCP/IP Model Correct
It is a network created when two or more PCs are connected and share resources without going through a separate server computer.
Peer-to-Peer ModelCorrect
It is a server that is used by IP Networks to dynamically distribute network configuration parameters like IP address for interface and services.
DHCP Server Correct
It is a server that translates the public IP Address into Domain Names
DNS ServerCorrect
It is a simple toggling property in the column of the table in MySQL or SQL that make the field required.
Not NullCorrect
It is a software application installed in your computer that is spying in your data, meaning this software gets information from your computer without you knowing it and sends it to the attacker or the hacker.
Spyware Correct
It is a software application that brings potential harm to your computer because it disrupt your computer operation by installing Trojan, viruses, worms, spyware, adware and other software that does malicious intent.
MalwareCorrect
It is a special type of application that prevents its user to access the computer system without paying its creator or subscribing/buying to its creator’s product or services.
Ransomware Correct
It is a type of software that operates and controls a particular type of device that is attached to a computer.
Device DriversCorrect
It is a virus that replicates itself to infect the whole computer and typically used by attacker to make a DoS or Denial of Service attack
WormsCorrect
It is an additional type of Database that is useful in any database design because they help support the business rules that you established while gathering the requirements for the system.
Lookup Table Correct
It is the data type used by Oracle Databases.
CLOB Data TypeCorrect
It is the fast-growing area of crime because more and more criminals are exploiting the speed, convenience and anonymity of the internet to commit a diverse range of criminal activities.
Cyber CrimeCorrect
It is the first DRAM chip of the Intel Company
1970Correct
It is the main program running on a computer. It manages the memory and processes of the computer, and all of its software and hardware
Operating System Correct
It is the main program running on a computer. It manages the memory and processes of the computer, and all of its software and hardware.
Operating SystemCorrect
It is the metal and plastic box which contains the computer's main components including the motherboard, central processing unit ( CPU), and power supply
Computer Case Correct
It is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event