Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
(a) LAN
(b) Web
(c) Hypertext
(d*) Internet (e) None of these
29.
Coded entries which are used to gain access to a computer system are called ..
(a) Entry codes (b*) Passwords
(c) Security codes
(d) Codewords (e) None
30.
31.
32.
33.
34.
35.
36.
37.
Which of the following is not true concerning user IDs and passwords?
(a) When you enter your user ID and password, the computer known it is you
(b) If your computer asks for a user ID and password, you can create your own
(c) Sometimes you are assigned a user ID and password with at least one other person
(d*) you should share your user ID and password with at least one other person
(e) None of these
38.
(c) Printer
(e) None
39.
An e-mail address typically consists of a user ID followed by the .. sign and the
name of the e-mail server that manages the users electronic post office box.
(a*) @
(b) #
(c) &
(d) *
(e) None of these
40.
41.
A computer.is set of program instructions that can attach itself to a file, reproduce
itself, and spread to other files.
(a) worm
(b*) Virus
(c) Trojan horse (d) phishing scan (d) None of these