Computer Book English
Computer Book English
1) The code for a Web page is written using Hypertext Markup language.
2) The first computers were programmed using Machine language.
3) A file name is a unique name that you give to a file of information.
4) This can be another word for program software.
5) Any data or instruction entered into the memory of a computer is
considered as storage.
6) Which part of the computer displays the work done monitor.
7) A series of instructions that tells a computer what.
to do and how to do it is called a program.
8) Hardware is the part of a computer that one can touch and feel.
9) The role of a computer sales representative generally is to determine a
buyer's needs and match it to the correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive
computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or
information is a window
13) The process of a computer receiving information from a server on the
internet is known as downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and
division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is
network server
25) The primary purpose of software is to turn data into information
26) The ability to find an individual item in a file immediately direct access is
used.
27) To make a notebook act as a desktop model, the notebook can be
connected to a docking station which is connected to a monitor and other
devices
28) You can use the tab key to move a cursor across the screen, indent a
paragraph.
29) A collection of related files is called record.
30) Storage that retains its data after the power is turned off is referred to as
non-volatile storage.
31) Internet is an example of connectivity.
32) Testing is the process of finding errors in software code.
33) A syntax contains specific rules and words that express the logical
steps of an algorithm.
34) Changing an existing document is called the editing documentation
35) Virtual memory is memory on the hard disk that the CPU uses as an
extended RAM.
36) Computers use the binary number system to store data and perform
calculations.
37) The windows key will launch the start buttons.
38) To move to the beginning of a line of text, press the home key.
39) When sending an e-mail, the subject lines describe the contents of the
message.
40) Tables, paragraphs and indexes work with when formatting text in word.
41) TB is the largest unit of storage.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in
clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be
quickly recalled because tape is a sequential because tape is a sequential
access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document
temporarily stored in flash memory.
48) One megabyte equals approximately 1 million bytes.
49) Information travels between components on the motherboard through
buses.
50) RAM refers to the memory in your computer.
51) Computer connected to a LAN can share information and or share
peripheral equipment
52) Microsoft office is an application suite
53) Utilities can handle most system functions that aren't handled directly
by the operating system
54) If you receive an e-mail from someone you don't know then you should
delete it without opening it
55) A set of instructions telling the computer what to do is called program
56) LAN refers to a small single site network
57) A collection of programs that controls how your computer system runs
and processes information is called operating system.
58) Device drivers are small, special-purpose programs
59) Transformation of input into output is performed by the CPU
60) Data going into the computer is called input.
61) Binary choice offer only two options
62) To indent the first paragraph of your report, you should use tab key
63) Fields are distinct item that don't have much meaning to you in a given
context
64) A website address is a unique name that identifies a specific web site on
the web
65) Modem is an example of a telecommunications device
66) A set of computer programs used for a certain function such as word
processing is the best definition of a software package
67) You can start Microsoft word by using start button
68) A blinking symbol on the screen that shows where the next character
will appear is a cursor
69) Highlight and delete is used to remove a paragraph from a report you
had written
70) Data and time are available on the desktop at taskbar
71) A directory within a directory is called sub directory
72) Testing is the process of finding errors in software code
73) In Excel, charts are created using chart wizard option
74) Microcomputer hardware consists of three basic categories of physical
equipment system unit, input/ output, memory
75) Windows is not a common feature of software applications
76) A tool bar contains buttons and menus that provide quick access to
commonly used commands
77) For creating a document, you use new command at file menu
78) Input device is equipment used to capture information and commands
79) A programming language contains specific rules and words that
express the logical steps of an algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone
security
81) Protecting data by copying it from the original source is backup
82) Network components are connected to the same cable in the star
topology
83) Two or more computers connected to each other for sharing information
form a network
84) A compute checks the database of user name and passwords for a
match before granting access
85) Computers that are portable and convenient for users who travel are
known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various computer parts and
allows the user to interact with the computer
88) Each cell in a Microsoft office excel document is referred to by its cell
address, which is the cell's row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large scale can be
connected using a corporate WAN
91) Storage is the process of copying software programs from secondary
storage media to the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a
form is completed properly or provide animation are known as flash
94) In a relational database, table is a data structure that organizes the
information about a single topic into rows and columns
95) The first computers were programmed using assembly language
96) When the pointer is positioned on a hyperlink it is shaped like a hand
97) Booting process checks to ensure the components of the computer are
operating and connectedproperly
98) Checking the existing files saved on the disk the user determine what
programs are available on a computer
99) Special effect used to introduce slides in a presentation are called
animation
100) Computers send and receive data in the form of digital signals
Shift + Home Highlight from the prevailing position to the start of the
line
Shift + End Highlight from the prevailing position to end of the line
Alt + Enter Open the properties window for the selected icon or
program
Ctrl + Esc These keys allow you to activate the start menu
Shift + Delete When you press the Shift and Delete keys together, your
program or files will be deleted permanently.
Alt + Shift + F1 When you wanna insert new worksheet use these keys
together
Shift + F3 With the help of these keys, you can open the MS-Excel
formula window
Shift + F5 When you press these keys together it will open the
search box
Ctrl + Shift +; With the help of these keys, you can enter the current
time
Ctrl + K When you want to Insert a link, you can use these keys
together
Ctrl + F These keys are used to open find and replace options in
MS-Excel
F2 When you want to edit the selected cell using this key
F7 With the help of this key, you can check the spell of
selected text
Ctrl + Space Use these keys together to select the entire column
Shift + Space Use these keys together to select the entire row
Ctrl + W Use these keys together to close the document
Ctrl + Z With the help of these keys, you can undo the last
deleted action
Ctrl + Tab With the help of these keys, you can move between two
or more open MS-Excel files
Alt + = With the help of these keys, you can initiate the formula
to add all of the above cells
Ctrl + With the use of these keys together you can insert the
value in the current cell from the above cell.
Ctrl + (Right With the help of these keys, you can jump on to the next
arrow) section of text
Ctrl + P Use these keys together to open the print dialogue box
in MS-Excel
Ctrl + V Paste
F12 Save as
Ctrl + S Save
Ctrl+Shift+< Reduce the font size of the selected text by one size.
Esc Exit the ongoing slide show and it will redirect you to
the earlier live view.
F5 With the help of F5, you can start the presentation from
the initial slide.
5 AI Artificial Intelligence
16 AS Autonomous System
36 BMP Bitmap
38 CC Carbon Copy
39 CD Compact Disk
48 CMD Command
64 dB Decibel
71 Doc Document
91 GB Giga Byte
98 IC Integrated Circuit
106 KB KILOBYTE
Attribute of one table matching to the primary key of other table, is called as
A. foreign key
B. secondary key
C. candidate key
D. composite key
E. super key
Ans: A
Allocation map
A. Used to store program data
B. specifies which blocks are used by which file
C. is updated by application programs
D. allow programs to erase files
E. No program will stop permanently
Ans: B
The master list of an indexed file
A. is sorted in ascending order
B. contains only a list of keys and record numbers
C. has a number assigned to each record
D. none of above
E. all of above
Ans: C
Database management systems are used to
A. eliminate data redundancy
B. establish relationships among records in different files
C. manage file access
D. none of above
E. all of above
Ans: A
Ascending order of data hierarchy is
A. bit->byte->record->field->file->database
B. bit->byte->field->record->file->database
C. byte->bit->field->record->file->database
D. byte->bit->field->file->record->database
E. none of these
Ans: B
Which is not a logical database structure?
A. Chain
B. Tree
C. Relational
D. Network
E. Object Oriented
Ans: A
Embedded pointer provides
A. a secondary access path
B. a physical record key
C. an inverted index
D. a virtual access
E. all of above
Ans: A
EASY EXERCISE
The connections between nodes are established using either cable media or
wireless media. In computer networks, networked computing devices
exchange data with each other using a data link.
MULTIPLE CHOICE QUESTIONS
Telnet
A. allows user to connect client machine remotely
B. transferring files
C. sharing files
D. allows user to see delivery report
E. none of above
Ans: A
Which layer will be used while transmitting data using FTP or Telnet?
A. Network
B. Application
C. Physical
D. Data link
E. Transport
Ans: B
EASY EXERCISE
● IP address or IPv4 is 32 bit/4 byte/8 nibble long in length.
● IPv6 address is 128 is 128 bit/16 byte/32 nibble in length.
● IP transport data in packets called datagram
● The address resolution protocol (ARP) is used to associate a logical
address with physical address.
● Each device on a link is identified by physical address which is imprinted
on network interface card.
● ARP is used to find physical address of the node when its internet
address is known.
● The reverse address resolution RARP is used to find internet address
when physical address is known.
● Internet control message protocol ICMP is used by host and gateways to
send notification of datagram problem back to senders.
● Line coding is the process of converting digital data to digital signal.
● Wavelength division multiplexing WDM is an analog multiplexing
technique to combine optical signal.
● Time division multiplexing TDM is a digital multiplexing technique.
● A virtual circuit network is a cross between a circuit switched network
and datagram network.
● Fast Ethernet has a data rate of 100 mbps.
● A Bluetooth network is called piconet.multiple piconet form a network
called scatter net.
● IPSec IP security operates on transport mode or tunnel mode.
● Digital signature needs an asymmetric key system.
++i is equivalent to
A. i = i + 2
B. i = i + 1
C. i = i + i
D. i = i – 1
E. i = i + 0
Ans: B
A linear list from which elements can be added or removed from either end
is called
A. stack
B. queue
C. deque
D. tree
E. heap
Ans: C
EASY EXERCISE
● A binary search tree whose left sub tree and right sub tree differ in
height by at most 1 unit is called AVL Tree.
● A Java applet is a small dynamic Java program that can be transferred
via the Internet and run by a Java-compatible Web browser. The time
during which a variable retains its value is known as its lifetime
variable. An assembler is a program that takes basic computer
instructions and converts them into a pattern of bits that the
computer's processor can use to perform its basic operations.
● A high-level language is a programming language such as C,
FORTRAN, or Pascal that enables a programmer to write programs that
are more or less independent of a particular type of computer.
SOFTWARE INTERRUPT
When a Process is executed by the CPU and when a user Request for
another Process then this will create disturbance for the Running Process.
This is also called as the Interrupt.
Interrupts can be generated by User, Some Error Conditions and also by
Software’s and the hardware’s. But CPU will handle all the Interrupts very
carefully because when Interrupts are generated then the CPU must handle
all the Interrupts Very carefully means the CPU will also Provides Response
to the Various Interrupts those are generated. So that When an interrupt has
Occurred then the CPU will handle by using the Fetch, decode and Execute
Operations.
Types of Interrupts
Generally there are three types o Interrupts those are Occurred For
Example
1) Internal Interrupt
2) Software Interrupt
3) External Interrupt
Ans:B
The main advantage of multiple bus organization over single bus is,
A. Reduction in the number of cycles for execution
B. Increase in size of the registers
C. Better Connectivity
D.None of these
E.Only A and B
Ans:A
Ans:E
The decoded instruction is stored in ______ .
A. IR
B. PC
C. Registers
D. MDR
E. None of these
Ans:A
Ans:B
Ans:B
The registers, ALU and the interconnection between them are collectively
called as _____ .
A. Process route
B. Information trail
C. Information path
D. Sequence path
E. Data Path
Ans:E
_______ is used to store data in registers.
A. D flip flop
B. JK flip flop
C. RS flip flop
D. none of these
E. Both B and C
Ans:A
EASY EXERCISE
OPERATING SYSTEM
Distributed
A distributed operating system manages a group of distinct computers and
makes them appear to be a single computer.
Templated
In an OS, distributed and cloud computing context, templating refers to
creating a single virtual machine image as a guest operating system, then
saving it as a tool for multiple running virtual machines.
Embedded
Embedded operating systems are designed to be used in embedded
computer systems. They are designed to operate on small machines like
PDAs with less autonomy.
Real-time
A real-time operating system is an operating system that guarantees to
process events or data by a specific moment in time.
Library
A library operating system is one in which the services that a typical
operating system provides, such as networking, are provided in the form of
libraries.
COMPILER
PROCESS STATE DIAGRAM
A thread is
A. lightweight process where the context switching is high
B. used to speed up paging
C. used in dead locks
D. used in mapping
E. lightweight process where the context switching is low
ANS: E Reference bit is used for
A. Implementing LRU page replacement algorithm
B. Implementing NRU algorithm
C. To check the page table entry in the cache memory
D. To troubleshoot
E. none of above
ANS: B
Dispatcher function is to
A. put tasks in I/O wait
B. schedule tasks in processor
C. change task priorities
D. push and pop
E. All of above
ANS: A
The part of machine level instruction, which tells the central processor what
has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
E. Registers
ANS: A
What is the name given to the values that are automatically provided by
software to reduce keystrokes and improve a computer user's productivity?
A. Defined values
B. Fixed values
C. Default values
D. String values
E. None of the above
ANS: C
Multiprogramming systems
A. Are easier to develop than single programming systems
B. Execute each job faster
C. Execute more jobs in the same time
D. Are used only on large main frame computers
E. None of above
ANS: C
EASY EXERCISE
“A access and also ensure that employees have adequate access to the
network and resources specialized field in computer networking that
involves securing a computer network infrastructure. Network security is
typically handled by a network administrator or system administrator who
implements the security policy, network software and hardware needed to
protect a network and the resources accessed through the network from
unauthorized to work.”
Malware, short for malicious software, is any software used to disrupt
computer or mobile operations, gather sensitive information, gain access to
private computer systems, or display unwanted advertising. Malware is a
category of malicious code that includes viruses, worms, and Trojan
horses.
Adware: The least dangerous and most lucrative Malware. Adware displays
ads on your computer.
Worm: A program that replicates itself and destroys data and files on the
computer. Worms work to “eat” the system operating files and data files
until the drive is empty.
Trojan: The most dangerous Malware. Trojans are written with the purpose
of discovering your financial information, taking over your computer’s
system resources, and in larger systems creating a “denial-of-service
attack”
Root kit: This one is likened to the burglar hiding in the attic, waiting to take
from you while you are not home. It is the hardest of all Malware to detect
and therefore to remove; many experts recommend completely wiping your
hard drive and reinstalling everything from scratch. It is designed to permit
the other information gathering Malware in to get the identity information
from your computer without you realizing anything is going on.
Backdoors: Backdoors are much the same as Trojans or worms, except that
they open a “backdoor” onto a computer, providing a network connection
for hackers or other Malware to enter or for viruses or SPAM to be sent.
Key loggers: Records everything you type on your PC in order to glean your
log-in names, passwords, and other sensitive information, and send it on to
the source of the key logging program. Many times key loggers are used by
corporations and parents to acquire computer usage information.
Rogue security software: This one deceives or misleads users. It pretends
to be a good program to remove Malware infections, but all the while it is
the Malware. Often it will turn off the real Anti-Virus software. The next
image shows the typical screen for this Malware program, Antivirus 2010
Ransom ware: If you see this screen that warns you that you have been
locked out of your computer until you pay for your cybercrimes. Your
system is severely infected with a form of Malware called Ransom ware. It is
not a real notification from the FBI, but, rather an infection of the system
itself. Even if you pay to unlock the system, the system is unlocked, but you
are not free of it locking you out again. The request for money, usually in
the hundreds of dollars is completely fake.
Browser Hijacker: When your homepage changes to one that looks like
those in the images inserted next, you may have been infected with one
form or another of a Browser Hijacker. This dangerous Malware will redirect
your normal search activity and give you the results the developers want
you to see. Its intention is to make money off your web surfing.
TYPES OF HACKERS
A. It is a computer
B. It is a program code
C. It is a company name
D. It is an application
E. All of above
ANS: B
A. Worm
B. Zombie
C. Virus
D. Trojan horse
E. None of above
ANS: B
A. Stealth virus
B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
E. All of above
ANS: C
A. Stealth virus
B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
E. None of these
ANS: A
A. Mutual engine
B. Mutation engine
C. Multiple engines
D. Polymorphic engine
E. None of above
ANS: B
A. Worm
B. Zombie
C. Virus
D. Trap doors
E. All of above
ANS: B
Which of the following is most likely to come with other malware?
A. Trojan
B.Worm
C.Virus
D.Spyware
E.Adware
ANS: A
A. Cracker
B. Worm
C. Trojan horses
D. Key logger
E.All of above
ANS: C
A. Boot virus
B. Macro virus
C. File virus
D. Anti virus
E.All of above
ANS: B
How does a Le-Hard virus come into existence?
A. Hardware
B. Software
C. FRIDAY 13
D. Command.Com
E.All of above
ANS: D
A. It is hardware
B. It is system software
C. It is a computer program
D. It is a windows tool
E. All of above
ANS: C
A. Computer viruses
B. Spyware scams
C. Phishing scams
D. None of the above
E. All of above
ANS: C
A. Time Bomb
B. Logic Bomb
C. Anti-virus
D. None of the above
E. All of above
ANS: B
A. Brain
B. Mind
C. ELK cloner
D. None of the above.
E. All of above
ANS: A
A. The Famous
B. HARLIE
C. PARAM
D. Creeper
E. All of above
ANS: D
The difference between a virus and a self-replicating program which is like a
virus is that rather than creating copies of itself on only one system it
propagate through computer
network. What is the self replicating program called?
A. Key logger
B. Cracker
C. Worm
D. All of the above
E. None of these
ANS: C
EASY EXERCISE
SOFTWARE ENGINEERING
HISTORY OF INTERNET
DIFFERENCE AMONG BLACK, WHITE & GRAY BOX TESTING
ARPANET
On a cold war kind of day in 1969 work began on Arpanet, the grandfather to
the Internet. Designed as a computer version of the nuclear bomb shelter,
Arpanet protected the flow of information between military installations by
creating a network of geographically separated computers that could
exchange information via a newly developed technology called NCP or
Network Control Protocol.
What is internet?
A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. a duplex network
E. none of the mentioned
Ans:B
Internet works on
A. packet switching
B. circuit switching
C. network switching
D. both (a) and (b)
E. none of the mentioned
Ans:A
Which one of the following is not an application layer protocol used in
internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. UDP
E. none of the mentioned
Ans:C
Which protocol assigns IP address to the client connected in the internet?
A. DHCP
B. IP
C. RPC
D. DSL
E. none of the mentioned
Ans:A
Which one of the following is not used in media access control?
A. Ethernet
B. digital subscriber line
C. fiber distributed data interface
D. ISDN
E. none of the mentioned
Ans:E Build & Fix Model is suitable for programming exercises of
___________ LOC (Line of Code).
A. 100-200
B. 200-400
C. 400-1000
D. above 1000
E. above 10000
Ans:A
Which one of the following models is not suitable for accommodating any
change?
A. Build & Fix Model
B. Prototyping Model
C. RAD Model
D. Waterfall Model
E. Hierarchical Model
Ans:D
Which of the following statements regarding Build & Fix Model is wrong?
A. No room for structured design
B. Code soon becomes unfix- able & unchangeable
C. Maintenance is practically not possible
D. It scales up well to large projects
E. All of above
Ans:D
Which model can be selected if user is involved in all the phases of SDLC?
A. Waterfall Model
B. Prototyping Model
C. RAD Model
D. both b & c
E. None of above
Ans:C
EASY EXERCISE
MEMORY MAPPING
Ans: D
Ans: D
Register is a ?
A. Set of capacitor used to register input instructions in a digital
computer
B. Set of paper tapes and cards put in a file
C. Temporary storage unit within the CPU having dedicated or general
purpose use
D. Part of the auxiliary memory
E. Part of main memory
Ans: C
For which of the following flip-flop the output clearly defined for all
combinations of two inputs?
A. Q type flip-flop
B. R S type flip-flop
C. J K flip-flop
D. T flip-flop
E. S flip-flop
Ans: C
A simple flip-flop
A. is 2 bit memory
B. is 1 bit memory
C. is a four state device
D. is a two state device
E. has nothing to do with memory
Ans: B
When used with an IC, what does the term "QUAD" indicates?
A. 4 circuits
B. 2 circuits
C. 8 circuits
D. 6 circuits
E. 16 circuits
Ans: A
EASY EXERCISE
TYPES OF SOFTWARE
MEMORY UNIT
MULTIPLE CHOICE QUESTIONS
Where does a computer add and compare data ?
A. Hard disk
B. Floppy disk
C. CPU chip
D. LSI chip
E. Memory chip
Ans: C
The word "Computer" usually refers to the Central processing unit plus?
A. External memory
B. Internal memory
C. Input devices
D. Output devices
E. Peripheral devices
Ans: B
Which device can produce the final product of machine processing into a
form usable by humans?
A. Storage
B. Input devices
C. Output devices
D. Control
E. Process
Ans: C
Which can read data convert them to a form that computer can use?
A. Logic
B. Storage
C. Control
D. Input device
E. Output device
Ans: D
Ans: D
The part of machine level instruction, which tells the central processor what
has to be done, is
A. JK flip flop
B. Address
C. Locator
D. Flip-Flop
E. Operation code
Ans: C
Ans: E
Which of the following are normally used to initialize a computer system's
hardware?
A. Bootstrap memory
B. Random access memory
C. External mass memory
D. Static memory
E. Dynamic memory
Ans: A
Ans: B
Ans: D
ALU is
A. Arithmetic Logic Unit
B. Array Logic Unit
C. Application Logic Unit
D. Access logic unit
E. none
Ans: A
VGA is
A. Video Graphics Array
B. Visual Graphics Array
C. Volatile Graphics Array
D. None of above
E. All of above
Ans: A
Ans: B
Ans: E
EASY EXERCISE
BITCOINS
Bit coin is a new currency that was created in 2009 by an unknown person
using the alias Satoshi Nakamoto. Transactions are made with no middle
men – meaning, no banks! There are no transaction fees and no need to
give your real name. More merchants are beginning to accept them: You
can buy webhosting services, pizza or even manicures.
CRYPTOGRAPHY
Cryptography is a method of storing and transmitting data in a particular
form so that only those for whom it is intended can read and process it.
The capability of a computer to perform more than one task at the same
time is called----
A. multitasking
B. batch processing
C. real-time processing
D. multiprocessing
E. framing
Ans: A
The altering of data so that it is not usable unless the changes are undone
is called----
A. biometrics
B. compression
C. encryption
D. decryption
E. none of these
Ans: C
---- can check the physical address of source & destination contained in the
frame.
A. Bridge
B. Router
C. Hub
D. Gateway
E. Repeater
Ans: A
The microcomputer, Intel MCS-80 is based on the widely used Intel
A. 8080 microprocessor
B. 0808 microprocessor
C. 8085 microprocessor
D. 8086 microprocessor
E. 8082 microprocessor
Ans: A
EASY EXERCISE
● The first IBM PC virus in the world was a boot sector virus dubbed
“Brain”, created in 1986, reportedly to deter unauthorized copying of
the software had written.
● A filename extension is an identifier specified as a suffix to the name
of a computer file. The extension indicates a characteristic of the file
contents or its intended use.
● A Denial of Service (DoS) attack is different from a DDoS attack. The
DoS attack typically uses one computer and one Internet connection to
flood a targeted system or resource. The DDoS attack uses multiple
computers and Internet connections to flood the targeted resource.
DDoS attacks are often global attacks, distributed via botnets.
● Traffic attacks: Traffic flooding attacks send a huge volume of TCP,
UDP and ICPM packets to the target. Legitimate requests get lost and
these attacks may be accompanied by malware exploitation.
● Bandwidth attacks: This DDos attack overloads the target with massive
amounts of junk data. This results in a loss of network bandwidth and
equipment resources and can lead to a complete denial of service.
● Application attacks: Application-layer data messages can deplete
resources in the application layer, leaving the target's system services
unavailable.
● VOIP is an acronym for Voice Over Internet Protocol, or in more
common terms phone service over the Internet. If you have a
reasonable quality Internet connection you can get phone service
delivered through your Internet connection instead of from your local
phone company.