1.
Which of the following contains text as well information about the text?
Answer: Option 'D'
Markup language
2.
Which of the following will make high-level application connections on behalf of internal hosts?
Answer: Option 'D'
Proxy Server
3.
The _______ icon and bold message heading indicating that the e-mail message has not been read.
Answer: Option 'B'
Closed Envelope
4.
Storing same data in many places is called _______
Answer: Option 'D'
Data Redundancy
5.
In computing, ______________ is an Adaptec-developed programming interface which standardizes communication on a computer bus.
Answer: Option 'A'
ASPI
6.
Which of the following is a cyber attack intended to redirect a website’s traffic to another, fake site?
Answer: Option 'B'
Pharming
7.
Which of the following is a method of transferring information between digital devices, especially audio and video equipment?
Answer: Option 'D'
Firewire
8.
Companies use ______ vendors to provide access to software and services rather than purchasing the applications and maintaining the applications themselves.
Answer: Option 'C'
Application service providers
9.
_________ is computer processing that enables a user to extract and view data from different points of view
Answer: Option 'B'
OLAP
10.
There are several primary categories of procedures. Which of the following is not a primary category of procedures?
Answer: Option 'C'
Firewall development
11.
By default, your documents print in ________ mode
Answer: Option 'B'
Portrait
12.
The path of the creation of an executable program is _______
Answer: Option 'D'
coding, compiling, linking, parsing
13.
Which of the following is a specification that combines video and audio into a single digital interface?
Answer: Option 'B'
HDMI
14.
Which of the following is open source project?
Answer: Option 'D'
All of these
15.
When a hardware component fails, the computer switches over to a redundant component without the service to the user being interrupted is termed as _____________
Answer: Option 'B'
Failover
16.
Which of the following source code is highly protected and only available to trusted employees and contractors?
Answer: Option 'C'
Closed Source
17.
Which of the following is an unethical web practice that keeps users trapped on a particular site?
Answer: Option 'B'
Clickjacking
18.
________ is a method of providing website content such as news stories or software updates.
Answer: Option 'A'
RSS
19.
When data changes in multiple lists and all lists are not updated this causes _____
Answer: Option 'B'
data inconsistency
20.
When a website automatically retrieves information from another website is known as ________
Answer: Option 'B'
Pull