Tuesday, March 12, 2013


COMPUTER QUIZ - 2




1.                 IC chips used in computers are usually made of _____________.
Answer: Silicon.
2.                 One kilobyte is equal to ____________________ .
Answer:  1024 bytes.
3.                 Which Supercomputer is developed by the Indian Scientists?
Answer:  PARAM.
4.                 The errors that can be pointed out by the compiler are___________.
Answer: Syntax error.
5.                 What is the general name of the device which produces hardcopy graphics?
Answaer: Plotter.
6.                 What is the term used for describing the judgmental or commonsense part of   problem solving?
Answer: Herustic.
7.                 UNIVAC is ________________.
Answer: Universal Automatic Computer.
8.                 A computer program that converts an entire program into machine language is 
called a/an __________________.
Answer: Compiler.
9.                 A computer program that translates one program instructions at a time into machine language is called a/an _____________________.
Answer: Interpreter.
10.             programs designed to perform specific tasks is known as _____________.
Answer: Application Software.
 





COMPUTER QUIZ - 1



1.Which is responsible for allocating IP addresses and managing the domain name system(DNS)?

Answer: ICANN - Internet Corporation For Assigned Names and Numbers.

 2. The performance of a hard driver or other storage device, meaning how long it take to locate a file is called?

Answer: Access Time.

3. Alerts are mostly appear in ____________?

Answer: Dialog Box.

4. Which language was used in first generation computers?

Answer: Machine Languages.


5. A unit of data storage that equals 2 to the 70th ( 2^70) power is called?

Answer: Zebibyte.

6. What is used in most programs that is a part of a program and guides the user through certain steps?

Answer: Wizard.

7.A generic name for Intel processors released after the original 8086 processor is ___________?

Answer: X86.

8. A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called?

Answer: Virtual Private Network(VPN).

9. V- RAM is used for access of the following?

Answer: Video & Graphics.

10. Panther(10.3), Jaguar(10.2), Puma(10.1) and Cheetah(10.0) are examples of ________?

Answer: Mac OS.









Spoofing in IT (Information Technology)

                  The term spoofing is also sometimes used to refer to header forgery, the insertion of false or misleading information in e-mail or netnews headers. Falsified headers are used to mislead the recipient, or network applications, as to the origin of a message. This is a common technique of spammers and sporgers, who wish to conceal the origin of their messages to avoid being tracked down.

Making an e-mail message appear to have come from one place to when really it comes from another is called spoofing. It is generally used by spammers, who do not want their real address to appear on the e-mails they send. Since the messages they send out have web links in them, they do not care if people click ‘reply’ and send an e-mails to the wrong place. It also makes it a lot harder for ISP to track them down and close their accounts.
                                                                                                       


                                                                                                                                                                              source from : wikipedia.