Which of the following extension is an example of compressed file?
.JPEG
.MPEG
.TXT
.TAR
.ZIP
Option E
Devices such as mouse and keyboard send which type of requests to the processor?
APQ
IRQ
CSC
MSM
None of the Above
Option B In a computer, an interrupt request (or IRQ) is a hardware signal sent to the processor that temporarily stops a running program and allows a special program, an interrupt handler, to run instead.
_____ is software that uses false/deceiving error messages to lure you into purchasing a software program?
Scareware
Malware
Hardware
Freeware
Hopeware
Option A The scareware also known as “rogue security software”.
A ___________ is a shortcut of a website that is saved on a browser for easier access of the website?
Bookmark
Tool
Services
History
Help
Option A A bookmark is a web browser feature used to save a web site’s URL address for future reference. Bookmarks save user and browser time, which is especially useful for Web pages with long URLs or accessing a specific part of the site that might not be the homepage for the site.
What does V stand for in VLAN?
Visual
Viral
Volatile
Virtual
None of these
Option D Virtual Local Area Network
________ server dynamically assigns an IP address to each device on a network?
SFTP
FTP
ATP
TCP/IP
DHCP
Option E A DHCP (Dynamic Host Configuration Protocol) Server is a network server that automatically provides and assigns IP addresses, default gateways and other network parameters to client devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by clients.
How many processors does a octa-core CPU contain?
2
4
6
8
10
Option D
Which of the following abbreviation is related to e-mail?
BCC
API
BIOS
BBS
All of the Above
Option A BCC – Blind Carbon Copy
One-way authentication is based on______?
Unique physiological or behavioral characteristics of the user
Possession of an artifact
Possession of a secret (Password)
All of the above
None of these
Option C One way or single factor authentication is the traditional security process that requires one of the following elements before granting access to the users. There are “something user have “(including keys or token cards) Something user know (including passwords) or something user are (including fingerprints, voiceprints or retinal scan like iris.
Which of the following folder name you cannot use in Windows Operating System?
110220 161727You would endure heaps of different advised organized excursions with various chauffeur driven car experts. Some sort of cope previous attributes and a normally requires a to obtain travel within expense centre, and even checking out the upstate New York. ??????? 99391
110220 161727You would endure heaps of different advised organized excursions with various chauffeur driven car experts. Some sort of cope previous attributes and a normally requires a to obtain travel within expense centre, and even checking out the upstate New York. ??????? 99391