SlideShare a Scribd company logo
IT SKILLS DEPARTMENT 
Subject: IT 140 Name: 
Date: Student ID: Marks Obtained: 
Q1. What is a password? 
( ) It is a set of files 
( ) It is a set of documents 
( ) It is a set of characters to get access to 
computer & network 
( ) All of above 
Q2. Password can protect your personal 
information? 
( ) True 
( ) False 
Q3. Writing your password on a paper is a 
good habit. 
( ) True 
( ) False 
Q4. Information Security means? 
( ) It is a process of changing information 
( ) It is a process of information 
technology 
( ) It is a process of keeping information 
secure. 
( ) It is a process of data to modify 
information 
Q5. You can tell password to anyone. 
( ) True 
( ) False 
Q6. Malicious Software is also known as 
malware. 
( ) True 
( ) False 
Q7. Back up is the activity of copying files or 
database. 
( ) True 
( ) False 
Q8. Copyright is not the ownership of an 
intellectual property. 
( ) True 
( ) False 
Q9. Malicious software (malware) is any 
software that gives partial to full control of 
your computer? 
( ) True 
( ) False 
Q10. Phishing is the act of attempting to 
acquire information such as usernames, 
passwords, and credit card details? 
( ) True 
( ) False 
Q11. Backup is the activity of deleting files or 
databases. 
( ) True 
( ) False 
Q12. In the following, which is not malware? 
( ) Viruses 
( ) Worms 
( ) Trojans 
( ) Back up 
Q13. A virus is an application program 
developed by software developers. 
( ) True 
( ) False 
Q14. Information Security is the practice of 
defending information from unauthorized 
access? 
( ) True 
( ) False 
IT 140 Test 1 ( All About Computer)
IT SKILLS DEPARTMENT 
Subject: IT 140 Name: 
Date: Student ID: Marks Obtained: 
IT 140 Test 1 ( All About Computer)

More Related Content

Similar to Session3

IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Super1
Super1Super1
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
Khristine Botin
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
ismaelhaider
 
Cyber security
Cyber securityCyber security
Cyber security
Prem Raval
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
Mandy Cross
 
Computer security
Computer securityComputer security
Computer security
fiza1975
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
aptexx
 
Network security interview questions & answers
Network security interview questions & answersNetwork security interview questions & answers
Network security interview questions & answers
Simpliv LLC
 
Data security
Data securityData security
Data security
Soumen Mondal
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
SMAU
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
 
Computer security
Computer securityComputer security
Computer security
Dhani Ahmad
 
Computer security
Computer securityComputer security
Computer security
Merma Niña Callanta
 
How to Build a Career in Cyber Security?
How to Build a Career in Cyber Security?How to Build a Career in Cyber Security?
How to Build a Career in Cyber Security?
Intellipaat
 
Session2
Session2Session2
Session2
Qasuk Mdkkw
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
Dr. Ramkumar Lakshminarayanan
 

Similar to Session3 (20)

IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Super1
Super1Super1
Super1
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
The Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan WarThe Comprehensive Security Policy In The Trojan War
The Comprehensive Security Policy In The Trojan War
 
Computer security
Computer securityComputer security
Computer security
 
Typical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdfTypical system servicesProgram executionIO operationsFile Sy.pdf
Typical system servicesProgram executionIO operationsFile Sy.pdf
 
Network security interview questions & answers
Network security interview questions & answersNetwork security interview questions & answers
Network security interview questions & answers
 
Data security
Data securityData security
Data security
 
Smau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano ZaneroSmau Milano 2015 - Stefano Zanero
Smau Milano 2015 - Stefano Zanero
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
How to Build a Career in Cyber Security?
How to Build a Career in Cyber Security?How to Build a Career in Cyber Security?
How to Build a Career in Cyber Security?
 
Session2
Session2Session2
Session2
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Basics of IT security
Basics of IT securityBasics of IT security
Basics of IT security
 

More from Qasuk Mdkkw

All about computers english arabic words
All about computers english arabic wordsAll about computers english arabic words
All about computers english arabic wordsQasuk Mdkkw
 
Session6
Session6Session6
Session6
Qasuk Mdkkw
 
Session5
Session5Session5
Session5
Qasuk Mdkkw
 
Session4
Session4Session4
Session4
Qasuk Mdkkw
 
Session1
Session1Session1
Session1
Qasuk Mdkkw
 
Meq1
Meq1Meq1
Input devices output devices
Input devices output devicesInput devices output devices
Input devices output devices
Qasuk Mdkkw
 
Meq
MeqMeq
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
Qasuk Mdkkw
 

More from Qasuk Mdkkw (9)

All about computers english arabic words
All about computers english arabic wordsAll about computers english arabic words
All about computers english arabic words
 
Session6
Session6Session6
Session6
 
Session5
Session5Session5
Session5
 
Session4
Session4Session4
Session4
 
Session1
Session1Session1
Session1
 
Meq1
Meq1Meq1
Meq1
 
Input devices output devices
Input devices output devicesInput devices output devices
Input devices output devices
 
Meq
MeqMeq
Meq
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
 

Session3

  • 1. IT SKILLS DEPARTMENT Subject: IT 140 Name: Date: Student ID: Marks Obtained: Q1. What is a password? ( ) It is a set of files ( ) It is a set of documents ( ) It is a set of characters to get access to computer & network ( ) All of above Q2. Password can protect your personal information? ( ) True ( ) False Q3. Writing your password on a paper is a good habit. ( ) True ( ) False Q4. Information Security means? ( ) It is a process of changing information ( ) It is a process of information technology ( ) It is a process of keeping information secure. ( ) It is a process of data to modify information Q5. You can tell password to anyone. ( ) True ( ) False Q6. Malicious Software is also known as malware. ( ) True ( ) False Q7. Back up is the activity of copying files or database. ( ) True ( ) False Q8. Copyright is not the ownership of an intellectual property. ( ) True ( ) False Q9. Malicious software (malware) is any software that gives partial to full control of your computer? ( ) True ( ) False Q10. Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details? ( ) True ( ) False Q11. Backup is the activity of deleting files or databases. ( ) True ( ) False Q12. In the following, which is not malware? ( ) Viruses ( ) Worms ( ) Trojans ( ) Back up Q13. A virus is an application program developed by software developers. ( ) True ( ) False Q14. Information Security is the practice of defending information from unauthorized access? ( ) True ( ) False IT 140 Test 1 ( All About Computer)
  • 2. IT SKILLS DEPARTMENT Subject: IT 140 Name: Date: Student ID: Marks Obtained: IT 140 Test 1 ( All About Computer)