1 |
Which Protocol is a standard protocol to transmit emails ? |
- A. SMTP
- B. HTTP
- C. HTML
- D. FLP
|
2 |
IP address may be static or _________: |
- A. Dynamic
- B. Rules
- C. Computer networks
- D. Computers
|
3 |
Which of the following is not a characteristic of good password ? |
- A. Is eight characters long
- B. Doesn't contain username
- C. Contains uppercase letters
- D. Password is your name only
|
4 |
Making illegal copies of software is called: |
- A. Stolen
- B. Phishing crime
- C. Identity Theft
- D. Piracy
|
5 |
In IPv6, there are ________ groups separated by '<b>:</b>' |
|
6 |
Which is called borrowing and installing a copy of a software application form a colleague ? |
- A. <sub>Softlifting</sub>
- B. Liability
- C. Denial of service
- D. Online piracy
|
7 |
When a key has less number of character than the text to the encrypt, then repeating letters of the key is called: |
- A. Interim ciphertext
- B. Cyber
- C. Client server oversue
- D. Online piracy
|
8 |
The _______ attribute provides an alternate text for an image, if the image is not displayed due to any reason<b>:</b> |
- A. Alt
- B. Image
- C. Src
- D. Img
|
9 |
ASCII stands for: |
- A. American Standard code
- B. American Standard Code for Information Interchange
- C. Information code
- D. Standard institute
|
10 |
A protocol defines _______ and _________ for communication between a sender and a reciver: |
- A. Rules, Regulation
- B. Problem, Regulation
- C. Center, Over
- D. Information
|