Question
Select Answer
4.1
Collection and analysis of data is called_______
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.2
________ is a simple and object oriented language.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.3
_________ specifies the address of the documentnto be displayed in the frame.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.4
_______ is a computer enthusiast or expert who gains unauthorized access to computer systems for the purpose of stealing and corrupting data.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.5
_______ is called Blind Carbon Copy.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.6
PCs connected with_______ can also be used for education, entertainment, etc.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.7
________ media is referred to as bounded media.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.8
E-mail address has two parts seperated by _________ symbol.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.9
_______ is a server which performs an action for another computer.
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP
4.10
The most common transfer protocol used on the Internet is _________ .
Select
Auditing
Java
SRC
Hacker
BCC
Internet
fiber-optic
@
Proxy server
HTTP