1. This machine is also called an electonic symbol manipulating sistem. What is it ?
a. Computer
b. Prosesor
c. Modem
d. Planar board
e. Memory
2. Software is also a series of instructions for the computer that performs a particular task. The word mean....
a. Certain
b. General
c. Definite
d. Detail
e. Document
3. A worm is a sofware which replicates by creating its own copy. What is the synonim of the word.
a. Indicate
b. Duplicates
c. Copy cat
d. Complicates
e. Complex
4. Which country used network for the first time ?
a. The USA
b. The UK
c. France
d. Germany
e. Russia
5. The geometric arrangement of a computer system in a network is called.
a. Topology
b. Protocol
c. Architecture
d. Ethernet
e. Nic
6. Someone who is expert in steganography is called.....
a. Steganator
b. Steganographyst
c. Steganalyst
d. Code breaker
e. Code password
7. The word steganography is of......origin
a. Greek
b. Gaelic
c. French
d. Latin
e. Germany
8. Removing hair or beard is called
a. Shaving
b. Growing
c. Harvesting
d. Cutting
e. Saving
9. NAZI used a machine called....to encrypt and decrypt the messages
a. Sigma
b. Enigma
c. Encarta
d. All false
e. All true
10. Which are is the TLD name for germany ?
a. De
b. Gm
c. Fr
d. Uk
e. Dt
11. Military base or campuses usually use the following type of network
a. Can
b. Han
c. Wan
d. Man
e. Lan
12. Beside Nic and Hub, we need.....to create a basic computer network
a. Receiver
b. Repeater
c. Controller
d. RJ-45
e. RG-45
13. Which ones are the techniques in steganography ?
a. Using invisible ink
b. Using microdot
c. Using messengers body
d. Using program language
e. All of the choices
14. In Julius caesar cryptography code PHVVDJH mean
a. Secrets
b. Message
c. Secured
d. Hidden
e. Password
15. The term Cryptography is derived from greek....mean “ hidden “ or “ secret “
a. Encrypt
b. Cryptic
c. Kryptos
d. Krypton
e. Kryptone
16. This website is a goverment agency
a. Ocw.mit edu
b. www.language –learning.net
c. Training.fema.gov
17. It contains information about the sender, the routing and the time of the message in a e-mail
a. Header
b. Signature
c. Footer
d. Body
e. List
18. Search engines operate algorithmically or are a mixture of
a. Algorithmic
b. Human input
c. Machine input
d. Algorithmic and human input
e. Script program
19. If one computer is broken in a ring network topology, then :
a. The whole network is down
b. A part of the network runs
c. A part of the network is down
d. It’s doesnt influence the network
e. A part of the computer
20. The first network ( ARPANET ) was designed for the following purpose
a. Education
b. Defense
c. Commercial
d. Entertainment
e. Sport
21. Why is steganography better than cryptography ?
a. Messages attract attention to themselves
b. Messages attract attention to messengers
c. Messages attract attention to recipients
d. Messages donot attract attention
e. Messages attract not the attention
22. ......In countries where encryption is illegal the word has similar meaning with
a. Writing
b. Hiding
c. Showing
d. Encoding activity
e. Covering
23. What is a steganographic message called ?
a. Cover message
b. Text cover
c. Secret code
d. Cover text
e. Password code
24. Julius caesar used cryptography to secure his message from his enemy, he replaced a character with its
a. Previous three
b. Previous two
c. Review two
d. Next three
e. Next two
25. The reverse process of encryption is called decryption it mean
a. The opposite process
b. The parallel process
c. The similiar process
d. The in-line process
e. The parallel system
26. It allows users to upload and download files from other computer
a. Ftp
b. Irc
c. Telnet
d. Edi
e. Aoc
27. Process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masqueranding as a trustworthy entity in an electronic communication is called
a. Spam
b. Worm
c. Makro
d. Phishing
e. Email bomb
28. Software is also a series of instruction for the computer that performs a particular task. The word mean....
a. Certain
b. General
c. Definite
d. Detail
e. Document
29. Programing can also be called by coding which is a process of writing.....debuging and maintain a source code of computer program.
a. Checking
b. Testing
c. Fixing
d. Encoding
e. Recording
30. What was the first network called ?
a. Arpanet
b. Arpa
c. Arpweb
d. Arpagate
e. Arpastar
31. There are......types of topology
a. Three
b. Four
c. Two
d. Five
e. Six
32. Which network topology uses a server ?
a. Star topology
b. Ring topology
c. Bus topology
d. None of them
e. Pass topology
33. A cryptographer is.....who is master in cryptography
a. Something
b. Anything
c. Someone
d. Anyone
e. No one
34. Microdots means......
a. Small dots
b. Very tiny dots
c. Medium-size dots
d. Big-size dots
e. Small prints
35. The word steganography means....in its origin language
a. cover
b. covered
c. hide
d. Discover
e. Convert
36. It ancient origins can be traced back to 440 BC is mean
a. Followed
b. Looked
c. Found
d. Seen
e. See
37. By using julius caesar cryptography code “ enemy “ becomes
a. Gpgoa
b. Fofna
c. Dmdlx
d. Hqhpb
e. Ngsdf
38. Cryptography is a part of.....and computer science
a. Matematics
b. Chemistry
c. Physics
d. Biology
e. Mathematic
39. In a network........
a. User can use the same printer
b. User can’t share information
c. User must use different resources
d. User can’t share resources
e. User can’t make a folder
40. The geometric arrangement of a computer system in a network is called
a. Topology
b. Protocol
c. Architecture
d. Ethernet
e. Nic
41. This method obivious drawbacks it means
a. Benefit
b. Disadvantage
c. Lucky
d. Goodness
e. Anvantage
42. In computer era steganography can be done by....a secret document into other document
a. Inserting
b. Convering
c. Saving
d. Getting
e. Sending
43. It allows for electronic transfer of data between companies over the internet
a. FTP
b. IRC
c. EDI
d. Telnet
e. AOC
44. The netique tte number 4 stater that “ you shall not use a computer to...
a. Steal
b. Hack
c. Break
d. Deal
e. Crack
45. It is malware which use e-mail as a way of replicating themselves into vulnerable computers
a. Email worm
b. Trojan horse
c. Spam
d. Email bomb
e. Virus
46. What is the specific address of a web page ?
a. The uniform resource locator
b. The hypertext mark-up language
c. The IP
d. The graphical user-interface
e. The program language
EmoticonEmoticon