CCFUND QUIZ
  • 1. is a means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers When two computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice, video, and computer programs
A) Ryzen 3600
B) world wide web
C) HTTP
D) Internet
  • 2. The most popular part of the internet is the
A) Internet
B) world wide web
C) GPU
D) HTTP
  • 3. WHO OWNS THE INTERNET?
A) No owns the internet
B) mark zucker berg
C) Canja
D) aristotle
  • 4. a computer network, and published his plan in 1967. At the same time, parallel research on packet switching occurred at MIT, RAND, and NPL in the UK (the first public packet-switched computer network)
A) ARPANET Network
B) Arpanet
C) The Galactic Network
D) Unix
  • 5. "interface message processor" computers used to connect to the network
A) Unix
B) The Galactic Network
C) ARPANET Network
D) Arpanet
  • 6. envisioning a global network of interconnected computers for easy data and program access. Licklider's
A) Unix
B) ARPANET Network
C) Arpanet
D) The Galactic Network
  • 7. a groundbreaking multitasking, multi-user operating system,
A) Arpanet
B) ARPANET Network
C) The Galactic Network
D) Unix
  • 8. was first developed in 1971 by Ray Tomlinson. who also made the decision to use the @ symbol to separate the user name from the computer name
A) Project Gutenberg and eBooks
B) The Beginning of TCP/IP
C) Cyclades
D) E-mail
  • 9. digitize and provide free access to books and documents in the public domain in various electronic formats
A) E-mail
B) The Beginning of TCP/IP
C) Cyclades
D) Project Gutenberg and eBooks
  • 10. it did pioneer a key idea the host computer should be responsible for data transmission rather than the network itself.
A) The Beginning of TCP/IP
B) E-mail
C) Cyclades
D) Project Gutenberg and eBooks
  • 11. so-called "inter-network", which would have no central control and would work around a transmission control protocol (which eventually became TCP/IP),
A) The Beginning of TCP/IP
B) Cyclades
C) Project Gutenberg and eBooks
D) E-mail
  • 12. a computer or an application dedicated to the sharing or exchange of messages or other files on a network
A) The PC Modem
B) ENQUIRE Software
C) The Bulletin Board System (BBS)
D) Usenet
  • 13. the device that allows your computers, smartphones, tablets, and other devices to connect to the internet.
A) Usenet
B) The Bulletin Board System (BBS)
C) The PC Modem
D) ENQUIRE Software
  • 14. Usenet was an internet-based discussion system, allowing people from around the globe to converse about the same topics by posting public messages categorized by newsgroups
A) ENQUIRE Software
B) Usenet
C) The PC Modem
D) The Bulletin Board System (BBS)
  • 15. a hypertext program that allowed scientists at the particle physics lab to keep track of people, software, and projects using hypertext (hyperlinks)
A) ENQUIRE Software
B) The PC Modem
C) The Bulletin Board System (BBS)
D) Usenet
  • 16. Scott Fahlman in 1982 who proposed using:-) after a joke, rather than the original :-) proposed by Mackenzie, The modem emoticon was born.
A) Domain Name System (DNS)
B) Virtual Communities
C) IRC-Internet Relay Chat
D) First Emoticon :-)
  • 17. was important in that it made addresses on the Internet more human-friendly compared to its numerical IP address counterparts.
A) The First Emoticon
B) IRC-Internet Relay Chat
C) Domain Name System (DNS)
D) Virtual Communities
  • 18. the most influential online community in the world
A) Domain Name System (DNS)
B) First Emoticon :-)
C) Virtual Communities
D) IRC-Internet Relay Chat
  • 19. paving the way for real-time chat and the instant messaging programs we use today.
A) Virtual Communities
B) First Emoticon :-)
C) IRC-Internet Relay Chat
D) Domain Name System (DNS)
  • 20. One of the first major Internet worms was released in 1988 Referred
A) Morris Worm
B) Long worm
C) Short Worm
D) Worm
  • 21. Who created The Morris Worm
A) Christian Jonathan
B) Robert Tappan Morris
C) Canja the first
D) Robert c. Kennedy
  • 22. an Internet application that allows you to browse many different kinds of resources by looking at menus or listings of information available also the first search protocol that examined file contents instead of just file names was launched
A) grass
B) grose
C) Gropper
D) Gopher
  • 23. The first widely downloaded Internet browser,it is considered the first browser to make the Internet easily accessible to non-techies.
A) Mosaic
B) E.Mail
C) Google
D) HoTMail
  • 24. the first webmail service, was launched.
A) FTP
B) HoTMail
C) E.Mail
D) Google
  • 25. went live in 1998, revolutionizing the way in which people find Information online.
A) Usenet
B) E-Mail
C) Google
D) FTP
  • 26. is a way of sending digital messages from an author to one or more recipients. It works over the Internet or other computer networks.
A) Usenet
B) Google
C) E-Mail
D) FTP
  • 27. allows users to transfer files from various host computers on the internet to their personal accounts. FTP(File Transfer Protocol) sites contain a wide range of content, from books and articles to software, games, multimedia, and more
A) Mosaic
B) FTP
C) HoTMail
D) Google
  • 28. News is a global electronic bulletin board system where millions of users exchange information on diverse topics. Unlike email discussion groups, Usenet messages are stored on central computers, and users connect to these computers to read or download posted messages
A) Google
B) FTP
C) E-Mail
D) Usenet
  • 29. ICANN means
A) i can be ga y
B) zawarado
C) Internet Corporation for Assigned Names and Numbers
  • 30. WHO USES THE INTERNET THE MOST?
A) Men
B) Women
C) Lebsian
D) Gay
E) Homophobic
  • 31. ch
A) phillipines
B) Switzerland
C) japan
D) Germany
  • 32. de
A) Germany
B) phillipines
C) japan
D) Switzerland
  • 33. jp
A) phillipines
B) Germany
C) Switzerland
D) japan
  • 34. uk
A) united kingdom
B) japan
C) phillipines
D) Germany
  • 35. ph
A) japan
B) phillipines
C) Germany
D) united kingdom
  • 36. The first computer virus to openly make it to the public was a program calle It was created by Rich Skrenta) a computer programmer who was in high school when this virs was created in 1982 Elk Cloner attached itself to the Apple DOS 3.3 operating system and was later spreaded by
A) (c)Brain
B) multipartite virus
C) polymorphic virus
D) Elk Cloner.
  • 37. The first PC virus was a boot sector virus named, Two brothers. Basil and Amjad Farooq
A) multipartite virus
B) (c)Brain
C) polymorphic virus
D) Elk Cloner.
  • 38. viruses want it all. A virus of this type may spread in multiple ways, and it may take different actions on an infected computer depending on variables, such as the operating system installed or the existence of certain files
A) multipartite virus
B) (c)Brain
C) polymorphic virus
D) Elk Cloner.
  • 39. may guard itself with an encryption algorithm that automatically alters itself when certain conditions are met.
A) (c)Brain
B) polymorphic virus
C) multipartite virus
D) Elk Cloner.
  • 40. applies to any virus that inserts itself into a sys tem's memory. It then may take any number of actions and run indepen dently of the file that was originally infected
A) web scripting virus
B) resident virus
  • 41. Displaying online video in your browser, for example, requires the execution of a specific code language that provides both the video itself and the player interface
A) resident virus
B) web scripting virus
  • 42. The lightweight AVG Free provides protection against the various nasties floating around the internet. Like many of the options in the Hive Five, AVG provides freeware (with limitations) and commercial versions of their software
A) AVIRA ANTIVIR
B) AVAST ANTIVIRUS
C) AVG ANTI-VIRUS
D) NOD32
  • 43. is best known for its speed and small system footprint, but users also swear as a comprehensive and bulletproof solution. At $40/ year for a home license, it's not free, die-hards claim the pricetag is well worth it
A) NOD32
B) AVG ANTI-VIRUS
C) AVAST ANTIVIRUS
D) AVIRA ANTIVIR
  • 44. is the happy home of many an AVG-switcher. Avast is slightly heavier on system resources, but users argue its excellent protection more than makes up for the increased footprint. The freeware version will cost you an email address to get a free registration code from their website.
A) AVAST ANTIVIRUS
B) AVG ANTI-VIRUS
C) NOD32
D) AVIRA ANTIVIR
  • 45. Avira is the go-to freeware application for detecting viruses and other malware that other antivirus applications miss. Like several of its peers, Avira is available in both freeware (Personal) and shareware.
A) NOD32
B) AVIRA ANTIVIR
C) AVG ANTI-VIRUS
D) AVAST ANTIVIRUS
  • 46. antivirus application Kaspersky point out its consistently strong ratings in malware protection as well worth the $60 license. Kaspersky also boasts an extremely quick response time to new virus- es, earning it a special place in the hearts and system trays of its users.
A) KASPERSKY ANTI-VIRUS
B) NOD32
C) AVAST ANTIVIRUS
D) AVIRA ANTIVIR
  • 47. Homer's epic poem, the thad, describes bow the Greeks destroyed Troy by a trick they persuaded the Trojans to accept agil A gigantic wooden horse that secretly contained Greek warriors, who then destroyed Troy
A) Trojan Horse
B) Rogue Websites
C) Email attachments
D) Time Bomb
  • 48. This computer program stays in the computer system until a specific date is reached. It is usually carried out by a vigis or a Trojan Horse For example there is a Michelan gelo virus that would execute on March 5th if you had the virus and you booted up your computer on that date.
A) Rogue Websites
B) Time Bomb
C) Email attachments
D) Trojan Horse
  • 49. The golden rule is that if you don't know what an attachment is, don't open it. To this day. many email users never open attachments, no matter what You don't have to take such drastic
A) Trojan Horse
B) Email attachments
C) Phishing Schemes
D) Time Bomb
  • 50. They often install adware bugs that will cause a flurry of pop ups to appear on your screen. This adware will often.
A) Phishing Schemes
B) Email attachments
C) Email attachments
D) Rogue Websites
  • 51. A phishing scheme starts re when you receive an email from a website claiming to be your bank or credit card company. You are asked to click a link and log in, but the truth is that you've just given away all of your personal information. Often times, when you visit these sites
A) Time Bomb
B) Rogue Websites
C) Phishing Schemes
D) Email attachments
  • 52. The Internet today is a much more law abiding place than it was len years ago. Not only did most people not have antivirus protection and firewalls that could stop incoming attack,
A) Hackers
B) Fake Anti Virus Software
C) Instant Messaging
D) Phishing Schemes
  • 53. these programs are often targets of hackers who see an easy way to trick people into clicking links that lead them to rogue websites.eople you know and never follow links to sites that you don't recognize ou should easily be able to keep Internet worms, viruses and other bugs bay
A) Hackers
B) Fake Anti Virus Software
C) Instant Messaging
D) From Mobile Devices
  • 54. This is one of the most frustrating ways to come infected with a virus or worm. There are dozens of anti virus and spyware programs you can download for free on the Internet and a sur- sing number of them actually do exactly the opposite of what they claim
A) Hackers
B) Fake Anti Virus Software
C) Phishing Schemes
D) Instant Messaging
  • 55. they inadvertently infected their computer with a virus. There really is no way to stop such an infection from happening, since we all buy peripherals that work with our computer, but we can ensure that we have the tools ready to go if an infection should happen.
A) From Mobile Devices
B) BOOT-SECTOR VIRUS
C) Fake Anti Virus Software
D) Friends and Relatives.
  • 56. Often times, we are sent viruses through our email from people that we know and trust. The social networking site Face- book has had to battle this very problem when their servers get a bug and automatically send out emails to everyone on the system that are infected. Often times
A) BROWSER HIJACKER
B) Friends and Relatives.
C) From Mobile Devices
D) BOOT-SECTOR VIRUS
  • 57. Boot sector viruses became popular because of the use of floppy disks to boot a computer.
A) From Mobile Devices
B) Friends and Relatives.
C) BOOT-SECTOR VIRUS
D) BROWSER HIJACKER
  • 58. This type of virus, which can spread itself in numerous ways including voluntary download, effectively hijacks certain browser functions, usually in the form of re-directing the user automatically to particular sites.
A) DIRECT ACTION VIRUS
B) BOOT-SECTOR VIRUS
C) FILE INFECTOR VIRUS
D) BROWSER HIJACKER
  • 59. This type of virus, unlike most, only comes into action when the file con taining the virus is executed. The payload is delivered and then the virus essentially becomes dormant - it takes no other action unless an infected file is executed again.
A) BROWSER HIJACKER
B) DIRECT ACTION VIRUS
C) FILE INFECTOR VIRUS
D) MACRO VIRUS
  • 60. , the fie infactor takes root in a host file and then begins its operation when the file is executed. The vitus may completely overwrite the file that it infects.
A) FILE INFECTOR VIRUS
B) BROWSER HIJACKER
C) DIRECT ACTION VIRUS
D) MACRO VIRUS
  • 61. Macros-special actions programmed into the document using a specific macro programming language. Unfortunate ly, this makes it possible for a virus to be hidden inside a seemingly benign
A) FILE INFECTOR VIRUS
B) BOOT-SECTOR VIRUS
C) BROWSER HIJACKER
D) MACRO VIRUS
  • 62. Who created the ILOVEYOU virus
A) Tito Gonzales
B) Onel de Guzman
C) Aldren Padul
D) Carlo
  • 63. World wide web was originally called?
A) Superman
B) Batman
C) Mesh
D) Meg
  • 64. The year when an email became popular that accounted for 75% of all ARPANET networks activity
A) 1860
B) 1973
C) 254 B.C.E
D) 1000
Created with That Quiz — where a math practice test is always one click away.