Bilgi Teknolojisi Ödev Yardımı
Bilgi teknolojisi atama yardımı, kullanıcılara en ileri bilim ve teknoloji hakkında çok yüksek kalitede bilgi sağlayabilir. Çok detaylı kategorize edilmiş bilgi verileri vardır ve yazılımın kendisinin bunları kullanma izni yoktur, böylece herkes teknolojiden sonuna kadar yararlanabilir.
Alışılmışın dışında teknoloji ve yaşam için de mükemmel bir içerik organizasyonudur. İlginç ve profesyonel içerik üretmek için kullanıcıları ve markaları birbirine bağlar. Teknik bilgiler, derinlemesine incelemeler, beceri ipuçları ve ürün deneyimleri vb. içerir. Grafik, video ve bilgilendirici reklam içerik formatlarına sahiptir ve başlıca yeni medya platformlarını kapsar.
- 32. Which of the following is the smallest network? [a]WAN [b]MAN [c]LAN [d]Wi-Fi 33. __ standard specifies that computers and devices on the network sha special signal. [a]TCP/IP [b]Token Ring [c]Ethernet [d]RFID 34. It can be a software program or a hardware device that filters all data packets coming internet, a network, etc it is known as the __ [a]Antivirus[b]Firewall [c]Cookies [d] Malware 35. The term "TCP/IP"stands for __ [a]Transmission Contribution protocol internet protocol [b] Transmission Control Pro protocol [c] Transaction Control protocol/ internet protocol [d] Transmission Control protocol
- That can monitor your un villaged used by detectives only [d]Is a database to record user's Information 26. What is Pharming? [a]Steal user data.including login credentials and credit card numbers. [b] A way to seek for user' private life [c]The email link you click on directs you to a fake website [d]When you type the con URL it directs you to a fake website 27. Software that automatically displays advertisements on a computer is called __ [a]Shareware [b]Freeware [c]Advare [d]Malware 28. What kind of malware is used to find out user browsing habits, keystrokes, or passwords for th purposes of identity theft? [a]Trojan virus [b] Adware [c]Virus a) Spyware 29. What is the purpose of Trojan Viruses? [a]Trick people into downloading malicious software [b]Put computers in a network to contr [c]Melt down the computer to a point of no function [d]Spread other malicious programs 30. Animations and interactivity with the user on web nace. can ba falpun
- 20. What are the 3 types of VR? [a]Immersive, 3D non-immersive [b]lmmersive semi-immersive non-immersive [c]Digital, semi- immersive, projective (d) 3D non-immersive, digital 21. RFID implies [a]Random Frequency Identifier[b]Radio frequency identifier [d]None of the above [c] Radio functioning Input device 22. NFC in full means [a]Nano-force chip [b]Near-force Connection [c]Near-field Communication [d]Near-Field Connection 23. __ is identified as fourth generation language. [a]C++[b]SQL[c]COBOL [d]FORTRAN 24. In the term HTTPS, what does the 'S' stand for? [a]Simple [b] Socket [c] Secured [d] server 25. What is Spyware?
- 15. In a database Table, the each cateror Above [a]Row [[b] Record [c] Field 16. Which of these is not an object-oriented programming language? 17. Which of the following tag is used to insert a line-break in HTML? [a]Java [b] Ruby [c]C+[d] PHP 18. How to create an unordered list (a list with the list items in bullets) in HTML? [a]lt uvert gt [b]lt opgt [c]lt bigt [d]lt 1rangle 19. In HTMLS, which of the following tag is used to initial dj<1DOCTYPE html> [a]<Doctype HTMLgt [b]lt [Doctype htmD [c]<Doctype> 20. What are the 3 types of VR? [a]Immersive, 3D non-immersive [b] mmersive, semi-immersive non-immersive [c]Digital, semi- immersive, projective dd 3D, non-immersive, digital
- 4. __ standard specifies that computers and devices on the network share or pass a special signal. [a]TCP/IP [b]Token Ring [c]Ethernet [d]RFID 5. It can be a software program or a hardware device that filters all data packets coming through th internet, a network, etc it is known as the __ [a]Antivirus(b]Firewall [c]Cookies [d]Malware 6. The term "TCP/P"stands for __ [a]Transmission Contribution protocol internet protocol [b] Transmission Control Protocol/ int protocol [c] Transaction Control protocol internet protocol [d] Transmission Control Protocol/ protocol 7. This type of authentication reads a unique personal characteristic to identify the user. [a]password [b] PIN [c] biometrics [d] PUK 8. __ compares data with a set of rules or values to determine if the data meets criteria