Sunteți pe pagina 1din 2

1. A. B. C.

Which of the following is used to represent alphanumeric characters in Computers? ASCII EBCDIC BCD

Answer: A 2. The following ports are available in a Certain Computer I. VGA port II. USB port III. PS/2 port Keyboards and mouse can be plug into Answer: The color-coded PS/2 connection ports (purple for keyboards and green for mice) If Mouse and keyboards are USB connection oriented than can be connected through USB port. 3. A. B. C. If you want to translate digital codes to audio signals and vice versa, your computer needs a Sound card CD-Rom Scanner

Answer: Sound Card 4. .Which of the following, represents the memory types in decreasing order of their accessing speed? A. B. C. RAM, ROM, Cache, Magnetic tape, Hard disk Cache, RAM, ROM, Hard disk, Magnetic tape Magnetic tape, Hard disk, RAM, ROM, Cache

Answer:C 5. A. B. C. Which of the following is not an example of a utility program? Backup software Operating system Anti-virus software

Answer: B 6. If you needed to covertly disable a link at a forum without detection nor changing the file size, how would YOU do it? 7. What is Web Scraping and what is the best program to use and why?

Answer: Visual Web Ripper is the best software for your problem. It can export into Excel, XML, SQL Server and mySQL.It has an easy to use GUI interface, and also allows programming for the advanced user.

8. How would you get first page rankings for a company with key words of EB5 investments within 30 days if you were in charge of SEO?

9. Which brand is the best external firewall and why? Answer : AVG provides a nice firewall as also does Zone Alarm and Kaspersky although the latter 2 do require you to train what comes in and what goes out and Zone Alarm is still Free .

10. Which is the best commercial encryption software and why? Answer: I would personally recommend TruCrypt.TrueCrypt is a free, powerful, and on-the-fly disk encryption tool. With TrueCrypt, we can create secure encrypted virtual disks or even encrypt entire drives. TrueCrypt is an on-the-fly encryption tool, meaning files are decrypted as you access them and modify them and then encrypted when not in use.

11. How do Yubikeys work? Answer: YubiKeys is a secure,Authenticated, easy to use, two-factor authentication device that is resistant from the replay-attacks, man-in-the-middle attacks, and a host of other threat vectors. YubiKey is in spirit a second authentication method based on a unique physical token which cannot be duplicated or recorded, providing a credential based on something only an authorized user possesses. It Uses a standard username and password, IT also provides a strong, two-factor authentication to any site, service or application. 12. How is Google now protecting passwords? Answer: Enroll in 2-step verification,Strong password Unsing Atleast one numeric and special character, Security Question and Now these day Google has Password protection with google drives too

S-ar putea să vă placă și