Questions 41 to 50, match the iterms in column A with the items in column B 41.
ID: 3607206 • Letter: Q
Question
Questions 41 to 50, match the iterms in column A with the items in column B 41. Worm 42. RGB 43. Gigabyte (GB) 44. Cookic 45. JPEG 46. All-in-one 47. USB port 48. Trojan horse 49. Web server a. Do not have a tower b. Can connect up to 127 different peripheral c. Computer that delivers requested webpages to your computer d. Security tool, that helps protects your PC e. A program that hides within or look like a legitimate program f. Color codes g. Small text file that a server stores on your computer h. Images file i. A program that copies itself repeatedly j. One billion characters 50. Personal firewall 42 43 45 47 48 49 wh the number with the nameExplanation / Answer
41. i
42. f
43. j
44. g
45. h
46. a
47. b
48. e
49. c
50. d
Explanation:
..............
41. Worm:
In computer world worm is a type of malware that duplicates(copies) itself to spread to computers and to infect them. The main function function is to infect the computers which are not infected.So that as per our options, ANSWER is: i) A program file that copies itself
42.RGB:
We all know that RGB is color code which is combination of (Red,Green and Blue). So that, ANSWER is: f) color codes
43.Gigabyte:
Usually gigabyte can store billion characters. Ans: j
44. Cookie:
Cookie is a small text file with data that from website that is stored into computer by web server.
45. JPEG:
JPEG is a type of image file. Ans: h
46.All-in-one:
Do not have a tower.
47. USB port:
Generally USB ports are used to connect so many number of peripheral devices. Typically they can connect upto 127 different peripherals. Ans: b
48.Torjan house:
Trojan horse is a type of program that appears harmless, ofcourse it is a malicious program. Usually it hides within computer and looks like legitimate program. Ans: e
49.web server: It is nothing but a device or computer that delivers requested webpages to users. Ans: c
50. personal firewall: Ofcource remaining one. Ans: d. Yeah but we generallu use firewalls to control network traffic based on predefined security rules.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.