Computer Course Sample Test

Published on January 2017 | Categories: Documents | Downloads: 52 | Comments: 0 | Views: 245
of 3
Download PDF   Embed   Report

Comments

Content

Part 1: Match the sentences in column A with the best definitions in column B A B -------- 1) Instruction of virus that cause the computer programs
malfunction a. browser b. network crime c. public access network d. web appliances e. encryption f. data transmission g. payload

-------- 2) ISPs that provide Internet access to customers, usually for a
monthly fee

-------- 3) special computer software program used to retrieve and read
information from a web site

-------- 4) technique to protect confidential information from being
accessed by unauthorized users

-------- 5) Handheld devices such as personal organizers and cellular
telephones needed to access a server

Part 2: Complete the sentences with the best alternatives
6) A type of virus that selects one or more programs to infect each time it is executed is called --------------. a. boot strap b. direct action c. parasitic d. multi-partite

7) Each page of information on the Web is assigned a ------------------------ that includes the domain name of the computer on which the page is located. a. MIME b. URL c. FTP d. TCP/IP 8) The difference between computer worms and viruses is that unlike viruses, worms are not ----------------. a. legal b. widespread c. self-duplicating d. updated

9) A computer software such as Yahoo that compiles lists of documents and the contents of those documents is called a -----------------------. a. search engine b. web browser c. network source d. web provide 10) Private networks of organizations with many interconnected computers is called -------------------. a. ARPANET b. Internet c. Netscape d. Intranet

11) Viral infection can be prevented by obtaining software from legitimate sources. Legitimate means ---------------a. hacker b. automated c. authorized d. intermediate 12) Viruses can also reside on portions of the hard disk or floppy disk that load and run the operating system when the computer is started. Reside means ----------------------------a. destroy b. operate c. infect d. locate

13) Unlike on-access scanners, On-demand scanners are launched only when the user activates them. Launce means ---------------------------. a. initiate b. violate c. eliminate d. duplictate 14) Security software can verify the identity of computer users and limit their privileges to use, view, and alter files. Which word is NOT synonym with Privilege ? a. right b. operation c. authority d. access 15) Passwords are confidential sequences of characters that allow approved persons to make use of specified computers, software, or information. Confidential means ----------------------------. a. personal b. smart c. secret d. sensitive

Part 3: Write TRUE or FALSE for the following statements
--------------16) Disaster recovery plans are periodically tested and upgraded to reduce the risk of

damage to diskettes or hard disks.
--------------17) E-mail software were at first designed for transferring all types of data such as

photographs, executable computer programs, and prerecorded audio.
--------------18) Hardware devices that connect networks in the Internet are called “Transmission

Control Protocol”
--------------19) The client/server architecture is one-to-one. That is, clients can access many

different servers, and servers can be accessed by a number of different clients
--------------20) A logic bomb infects a computer’s memory, but unlike a virus, it does not replicate

itself.

Part 4: Cloze Test. Fill in the gaps with appropriate words. (2 words are EXTRA!!) version – download – transparent – remote – integrated – location – digitizes – invoked

The Internet can be used to transfer telephone calls using an application known as IP-telephony. This application requires a special phone that (21)------------------------------- voice and sends it over the Internet to a second IP telephone. Another application, known as the File Transfer Protocol (FTP), is used to (22)-------------------------------- files from an Internet site to a user’s computer. The FTP application is often automatically (23)--------------------------------- when a user downloads an updated (24)------------------------------- of a piece of software. Applications such as FTP have been (25)------------------------------- with the World Wide Web, making them

(26)-------------------------------- so that they run automatically without requiring users to open

them. When a Web browser encounters a URL that begins with ftp:// it automatically uses FTP to access the item.

Part 5) Translate the following extract into Farsi

Parasitic or file viruses infect executable files or programs in the computer. These files are often identified by the extension .exe in the name of the computer file. File viruses leave the contents of the host program unchanged but attach to the host in such a way that the virus code is run first. They may select one or more programs to infect each time they are executed or hide in the computer's memory and infect a particular program when that program is run. -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close