171. To prevent the loss of data during power failures, use a(n)_____________?

A. Encryption program
B. Surge protector
C. Firewall
D. UPS

172. __________is defined as any crime completed through the use of computer technology?

A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking

173. ___________refers to electronic trespassing or criminal hacking?

A. Cracking
B. Jacking
C. Spoofing
D. Smarming

174. The first electronic computer was developed by____________?

A. J.V. Attansoff
B. Bill Gates
C. Simur Cray
D. Winton Serf

175. _____________computers operates essentially by counting?

A. Portable computer
B. Hybrid computer
C. Analog computer
D. Digital computer

176. ____________computer is small general purpose micro computer, but larger than portable computer?

A. Hybrid
B. Digital
C. Desktop
D. Laptop

177. ____________is the measurement of things such as fingerprints and retinal scans used for security access?

A. Biometrics
B. Bio measurement
C. Computer security
D. Smart weapon machinery

178. What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Access-control software

179. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?

A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall

180. The scrambling of code is known as___________?

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing

NOTE
IF YOU THINK ANY OF THE MCQ ABOVE IS WRONG.
PLEASE COMMENT WITH CORRECT ANSWER AND ITS DETAIL EXPLANATION IN COMMENT BOX.
THANK YOU

This Post Has One Comment

Leave a Reply