Information Technology 25
Information Technology 25
A. keyboard. B. trackball.
C. lightpen. D. floppy.
Answer: B
22. Some websites proved chat rooms to interact with an individual or a group is called ____
(A) Usenet (B) Newsgroup
(C) Chatting (D) E-mail
Answer: C
23. What does "CC" stand for in the context of email communication?
A. Carbon Copy B. Copy Content
C. Communication Centre D. Common Correspondence
Answer: A.
24. What is the purpose of the "BCC" field in an email message?
A. To specify the recipient's email address
B. To send a blind copy of the email to recipients
C. To provide a subject for the email
D. To attach files to the email
Answer: B
25.What is the term for a short, automated response sent in reply to an incoming email or instant
message?
A. Emoji B. Signature
C. Autoresponder D. Attachment
Answer: C
26. What is the function of the "Subject" field in an email message?
A. To specify the recipient's email address
B. To attach files
C. To provide a brief description of the email's content
D. To send emoticons and emojis
Answer: C
27. Which of the following is a common email attachment file format?
A. PDF (Portable Document Format)
B. ZIP (Compressed Archive)
C. HTML (Hypertext Markup Language)
D. MP3 (MPEG Audio Layer III)
Answer: A
28.Which of the following social media platforms is primarily focused on professional networking and job
searching?
A. Facebook B. Instagram
C. LinkedIn D. Snapchat
Answer: C
29.Which of the following is NOT a common feature of online collaboration tools?
A. Real-time chat C. Version control
B. Video streaming D. File sharing
Answer: B
30. What is the purpose of an email attachment?
A. To format email messages
B. To provide a summary of the email
C. To attach files or documents to an email
D. To send emoticons and emojis
Answer: C
31. Which of the following is NOT a common feature of online collaboration tools for document editing
and sharing?
A. Real-time collaboration
B. Version history
C. Social media integration
D. File synchronization
Answer: C
32. Which of the following is an essential element of good communication in teamwork?
a) Active listening. b) Dominating the conversation.
c) Avoiding conflict. d) share idea’s
Answer: A
33.Sending an E-mail is similar to ____________
A. writing a letter B. drawing a picture
C. talking on the phone D. sending a package
Answer: A
34. Which of the following is the appropriate format of URL of e-mail?
a. www_mail.com b.www@mail.com
c. WWW@mail.com d. www.mail.com
Answer: B
35. Match the following.
List 1 List 2
A Virus I. They are hard to detect
B Worms II. It is copied itself
C Trojan III. Non-self-replicating type of malware
Select the correct match using the codes given below:
A. A-II, B-I, C-III B. A-I, B-II, C-III
C. A-II, B-III, C-I D. A-I, B-III, C-II
Answer: A
36. An unsolicited e-mail, message sent to many recipients at once is a___
a. worm b. Virus
c. threat d. spam
Answer: D
37. An antivirus is a(n)_____
A. program code B. computer
C. company name D. application software
Answer: D
38. A term used to describe the location or folder where E-mail is stored before being sent.
A. Inbox B. Draft
C. Outbox D. Sent items
Answer: C
39. Given the following e-mails fields, which of the email addresses will swami be able to see when he
received the messages
To... ram@test.com
Cc... raj@test.com, ravi@test.com
Bcc… Swami@test.com , rama@test.com
Options are:
A. ram@test.com
B. ram@test.com , raj@test.com, ravi@test.com
C. ram@test.com , rama@test.com
D. raj@test.com, ravi@test.com , ram@test.com , rama@test.com
Answer: B
40. Which of the following enables us to send the same letter to the different people in MS Word?
A. Mail join B. Mail copy
C. Mail insert D. Mail Merge
Answer: D
41. Code Red is a type of ________
A. An Antivirus Program B. A photo editing software
C. A computer virus D. A video editing software
Answer: A
42. Which one of the following can be considered as the class of computer threats?
A. Dos Attack B. Phishing
C. Soliciting D. Both A and C
Answer: A
43. What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber-attacks
d) All of the mentioned
Answer: D
44. What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned
Answer: B
45. Which of the following is a type of cyber security?
a) Cloud Security b) Network Security
c) Application Security d) All of the above
Answer: D
46. Which of the following is a component of cyber security?
a) Internet Of Things b) AI
c) Database d) Attacks
Answer: A
47. Governments hired some highly skilled hackers for providing cyber security for the country or state.
These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
Answer: A
48. Which of the following actions compromise cyber security?
a) Vulnerability b) Attack
c) Threat d) Exploit
Answer: C
49. IT security in any firm or organization is maintained and handled by ____________________
a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer
Answer: D
50. What is the existence of weakness in a system or network is known as?
a) Attack b) Exploit
c) Vulnerability d) Threat
Answer: C