Rss Feed Like Us on facebook Google Plus
Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

November 20, 2013

Ways to Prevent from Popular Online Scams

Online Scams can be done in many forms to your computer,phones or website. so this article going to cover some popular online scams and ways to prevent from it...
 
The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them, for example by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.
 
Internet fraud can take many forms: identity theft, injecting malware, fraudulent transactions. It can occur through e-mail, smartphones, websites, and chat rooms. Here are some such scams and ways to avoid them.

These are the sites that are not legitimate and have malicious software to hack your personal information. A lot of such infected sites come up during festive season, when people are buying gifts online, and hackers build these using popular search items. Another variation of infection is legitimate sites that get heavy traffic and, hence, are injected with ads and images that have viruses. 
 
>> A good way to avoid these is to go with familiar, popular sites or install ad blockers on your browser.

2) Fake phone apps

Be very careful about the apps that you download on your phone. Android and Apple phones are particularly vulnerable to fake apps in their stores, and these can introduce malware that steals the datayour phone. 
 
>> To avoid fake apps, check the users' review about the game or app before you download it. You can also go to the developer's website and get more information about the app before zeroing in on it. Another safe option is to go for the most downloaded apps or those that come with the 'editor's tag'. Avoid the apps that are 'paid' but are being offered for free, or ask for too much information.

3) International dialling

If your Internet connection is through a modem using a local telephone number, beware. Some sites lure people into viewing content that requires them to download a dialler or viewer. If you do so, your computer will be disconnectedthe Net and will instead be used to dial an international number, resulting in high phone bills. 
 
>> To safeguard yourself, avoid sites that require you to download a program to view content. You can also have your line blocked making international calls. Also make sure your computer has anti-malware software to detect any illegal activity.


This is probably the oldest known scamming technique that is still going strong. Here e-mails, purportedly sent outwell-known institutions and social networking or payment sites, are used to draw out sensitive, personal informationpasswords and credit card details. These mails could also carry links to infected sites.

>> A preventive step is to never give out personal information and call up the company to crosscheck that the e-mail is genuine. Also scan the url for security (use of https in the address bar means it is safe).

5) Pharming

A combination of 'farming' and 'phishing', this term refers to the process by which a hacker gets a domain name for a site and then uses it to redirect this site's traffic to another, bogus website. It can comp romise serious information and cause heavy losses if the site being copied is that of a bank or taxation department. It can also be used to steal passwords, PIN or account numbers.

>> The best way to prevent this is to make sure you use secure Web connections (https) to access privacy-sensitive sites.

 
6) Wi-Fi hacking

If you use a public Wi-Fi connection, such as at airport terminals or coffee shops, to log into your account, you stand the risk of having your password and private information hacked. The hacker can also access your browsing history. This is especially true if you save the password to your account. 
 
>> If you are using a smartphone to access your account, try to use the 3G or 4G connection as it is more secure.

7) Auction/shopping scams

With online shopping and auction sites—wherein you put up household items and gadgets for bidding and sale— becoming popular, the scope of fraud has increased. You could be scammed out of your money by not receiving the goods at all, getting poor quality items, or beingged more than the price mentioned. Your credit card information could also be used fraudulently. Besides, the seller could be defrauded if he doesn't get any payment.

>> To avoid it, make sure you know as much as possible about the item and seller/buyer. The latter shouldn't have just an e-mail or a post office box address. Call him up and ask him about the address and extrages. Also go through the feedback.

8) Investing scams

Here, the prices of stocks are manipulated by sending out false information about the companies through e-mails, chat forums or Internet boards. This results in a rise or fall in the prices of stocks and the scamster benefits by selling or buying shares at the right time. In another variation of investing scam, which came under the Sebi scanner recently, companies were offering 'guaranteed return' schemes through e-mails, websites, blogs and social media platforms, and conning people out of their money. 
 
>> The best way to avoid it is to conduct your own research about the company, and not invest in schemes that promise outrageous returns.

9) Employment fraud

There are two variants of this scam. The more common one involves job offers by recruiters that require you to pay an advance fee or make a deposit, without the job ever materialising. The second one typically offers you the job of a 'representative' of an overseas company and your task is to collect customers' deposits in your account and remit most of it to the company abroad. In doing so, you could not only be a victim of identity theft, but also have money stolenyour account.

>> Avoid any such offers without verifying the company and do not give out personal information.

10) Click scams 

Have you ever clicked on the game strips or dancing/jumping figures that pop up and move across your screen while you are on social networking or other sites? 
 
>> Don't click on on the game strips or dancing/jumping figures . These could be fake and could lead you to click on concealed links, which either make your personal information public or provide access to confidential information stored on your computer.
 
Read More

July 14, 2013

Data, Information and Knowledge

Data by itself is useless. An MP3 file is garbage without software to render it into a song, which is a kind of information. Ditto with your bank balance and the video you shot over the holiday, or the formula or source code for a new product. Instead of making data security our top priority, wouldn't we be better off focusing on data transformation?


I still see far too many examples of content confusing the ideas of data and information. Sometimes it seems a writer is simply trying to avoid being redundant when using data and information in the same sentence to mean the same thing. Of course, they are different, and the result is unnecessary confusion.

I just wrote a paper for a European law journal on the topic, and I learned more about it than is healthy for one person. The piece will be out in August. Generally, I admire the effort the Europeans are making to get it right, though they are less concerned with data and information per se than they are with privacy and security. These things all intersect but in sometimes unpredictable ways. The more I think about things, the less I am sure of -- and the more questions I have.

The European parliament is trying to figure out laws that protect individual rights to privacy, which necessarily affect what data is kept and what is not. That makes sense, and it sounds simple, but how do you do that? Does a person walking on a street have a right to privacy and thus a right to determine how you use a crowd photo?

What if a corporation like Google or a government takes the photo? Are we to prevent photos, based on the premise that someone someday might do something to a person in one of the photos based on the picture? From there it gets silly, but there are some concrete situations that are nothing to laugh at.

The Persistence of Memory

Take the case of a nurse in Connecticut who was arrested for possessing a small amount of pot. The case was dismissed when she agreed to take some drug education courses, according to an article in The New York Times. In the good old days, that would have been the end of it, because according to Connecticut law -- and the laws in many other states -- her record was wiped clean with the dismissal. Under Connecticut law, she can even testify under oath that she has never been arrested now that the record has been cleared.

That all makes good sense to me. It might not be factually correct, but these expungement laws are one of the fictions we create in modern life to keep the world spinning. However, with the Internet, there's no such thing as expungement, and a search still comes up with the original news article that -- while true when it was published -- is now false.

It matters, because this nurse can't find a job any more, thanks to the simple expedient of prospective employers doing a rudimentary search on every new job applicant. What to do? She's suing the news organizations that wrote the story for slander, but the story was true when it was reported. Yikes!
The Internet and our modern world are full of examples like this. Society used to be able to conveniently forget small indiscretions, and we all got on with life. Now that's being taken away, without anyone even giving permission or any new law being adopted. The Internet is the defacto repository of all things digital about us -- but should it be? The Europeans take all this very seriously, and perhaps we should too.

Information Alchemy

It seems to me that the biggest issue we have with data and information today is not data security, even though lots of it gets stolen (I'm talking to you People's Liberation Army unit 61398). In fact, I think we've put too much emphasis on physically securing data and given too little thought to how it is transformed into information.

After all, data by itself is useless. An MP3 file is garbage without software to render it into a song, which is a kind of information. Ditto with your bank balance and the video you shot over the holiday, or the formula or source code for a new product.

Wouldn't we be better off focusing on data transformation? A new photo sharing service, SnapChat, takes this approach by delivering photos that disintegrate after 10 seconds. That's far from ideal for most applications, but it's on the right track.

Generally, I think data ought to be handled like milk in a supermarket; it ought to have an outdate after which it automatically becomes archival. You might be able to access archival data, but transforming it back into its original information content would have to be restricted in some way.
Look, we can still access information about various flat Earth theories, but we all know this is archival and historic and no longer scientific. Some of us can still take it seriously if we want to, but we can't take it to the bank or whatever -- you know what I mean.

We don't have anything like that for data yet -- something that says this does not yield not the information it once did. On a parallel path, if we were better able to control the conversion of data to information so that only the data's owners could de-encrypt it, might we have less data theft and the loss of intellectual property that goes with it?

If any of this makes sense, then it's not data security we should focus on as much as secure data conversion or transformation into information -- those are different issues with different approaches. When you think of it this way, the differences between data and information are starkly clear. It gives us all good reason to consciously choose the right words to convey our meaning.

Read More

July 2, 2013

Details of Wi-Fi Technology

Wi-Fi Technology is a wireless networking technology that deals with radio technology this is to mean it uses radio waves to provide high speed wireless connections. It is a product developed by the Institute of Electrical and Electronics Engineers 802.11 standards in 1997 Its commercialization was initiated by the Wi-Fi Alliance. Wi-Fi is the short form of Wireless Fidelity.
It was only used in place of 2.4GHz at first but it advanced to include all types of networks. Wi-Fi engages with many applications and equipment’s like video game gadgets, home networks, mobile phones as well as major operating systems. An individual or organization can use a wireless router to create a hotspot where devices that can connect wirelessly to obtain internet access. This router is mostly connected to a modem. One can access the internet if you are within around 100 feet.
Networks can either be open or closed and the region which wireless access is obtainable is called a wireless hotspot. People within the hotspot can enjoy internet access if they possess a router or a modem. Wi-Fi works with no physical connection between sender and receiver by using frequency from radio technology. It has to have an access point where it broadcasts a wireless network which devices detect.
Wi-Fi has four main components; networking gateway; which is between high-speed access connection and the wireless network, wireless network; which connects the devices being used with the high frequency radio waves, high-speed access; a very fast internet connection commonly called a broadband and a wireless end user; these are the customers who have internet enabled devices. They are all intertwined in that the end user connects to internet via the wireless network to the gateway.
Wi-Fi has therefore come out to be one of the greatest innovations in regard to internet connections. It has made it very efficient and effective for individuals to access internet services from anywhere as long as they fall within the hotspot range also business no longer need wires running from all parts of the office block just to enhance internet connectivity. This has therefore made work easier.
As it is well known, all things have pros and cons and Wi-Fi doesn’t fall on the exception of this. Wi-Fi requires passwords for security purposes. This is so as to safeguard important information especially for businesses that deal with certain vital information. This has therefore been a challenge as hacker’s crop up from computer literate individuals. Organizations have therefore ended up incurring more cost just because they opted to engage Wi-Fi.
Costs like upgrades after a certain durations and employing a whole department to deal with hacking cases has been inherent in many organizations. These costs can be attributed to Wi-Fi application installation.
There has also been cases where employees of an organization share passwords of the wireless connection therefore other non-employees are able to gain access to internet. This can therefore render the organization at a risky position which can be hacked by these outsiders.
Wi-Fi Technology has been made accessible from devices like laptops, phones and tablet computers. This has been one of the greatest creations in this modern time. There has also been advancement in it’s use whereby long distance buses have been equipped with Wi-Fi thereby keeping their travelers engaged to the internet.
It is advisable that business install Wi-Fi as it creates an efficient environment for working. Individuals who also work from home via internet could also gain a lot from this technology. It offers freedom of movement for individuals and employees and there are now a lot of compatible devices available.
Read More

How to Fix Windows 7 Blue Screen Error?

Windows 7 Blue Screen Errors are very commonplace but one of the most difficult errors that are remaining unbeaten in spite of forcing with several encounters. Always a STOP error code comes along with the display identifying its real kinds since these errors are not easy to remove. Since there can be simply numerous reasons active as the underlying source of this unexpected disgust, only an error code cannot be sufficient to make the user discover the instantaneous dysfunction that occurred right at the moment.
The probable hidden causes can be related to the problem indicating the variation of temperature, mismatching the time, failure or issue belonging to hardware, misappropriation or conflict due to lack of right resource, incompatibility of a particular device inside the hardware environment, virus, or a corrupt registry, etc. or more. When user detects windows 7 blue screen error he must be specific before he starts fixing. This is a matter to realize and to analyze to the extreme degree after one detects the problem. From various result after checking with some typical experimental trials, user can be sure about the persisting problems. Somehow driver of the module gives an indication of the reason behind the error. There are many more significant techniques to uncover the fact that acted behind the blue screen problems. But sometimes it requires no technique to identify. Whatever it is, this is the prime matter to recover anyway using the effective tools; and further the apparatus that will come to use for fixation can outplay the windows 7 blue screen problems quite permanently. Now it is the burning question how to recover or at least encounter effectively against the blue screen errors as it will help the screen work again.
As incorrect BIOS setting can lead the conflict grows together, it is recommended to load the default values of BIOS as a rescue.  Also the BIOS should be updated properly. BIOS setting recheck is the most important fact of this time, after every frequent add of new hardware and its installation.
Irregular updates, missing updates, and the service packs are the source of errors in many cases. But it is indispensible to fix windows 7 blue screen errors on right time. Instantly user should test the memory of machine whether it runs or not. With the system user should scan the virus consummately, and repeatedly as well as running spyware scan after the update completes of the definition files. Computer’s RAMshould be tested once, since the fault mechanism in memory can cause the blue screen errors very often. RAM should be free from problems and user should use the flexible way to test the memory by taking help of various programs compatible for various operating systems such as memtest86 etc..
As the blue screen errors are not solely the inconvenience at using the machine, resulting with the consistent presence of errors, it becomes fundamental task at this situation to resolve the problem. This is also called death error that not unlikely can lead the circumstance far deeper with the disgust, when it remains constant till the phase with problems after being detected.
Read More

June 27, 2013

change internet explorer page setup programmatically with C#

Change printer setting of internet explorer with C#,basically you can change it bu updating
registry key.

Users can easily change Internet Explorer printer settings for the page margins, the header, and the footer through the Internet Explorer user interface. However, Internet Explorer and the Web Browser control do not include methods to change these settings programmatically.

The following steps outline how Microsoft Internet Explorer accesses the printer settings:

  1. Internet Explorer tries to obtain the values from the following registry key:
    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\PageSetup
  2. If the key in step 1 does not exist, Internet Explorer tries to create this key by copying the values from the following key:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\PageSetup
  3. If the key in step 2 does not exist, default values are provided.
Checkout the below program..

using Microsoft.Win32;
 
namespace iesttings
{
    Class ie
    {
        public void ChangeIEPageSetupSetting()
        {
            string strKey = "Software\\Microsoft\\Internet Explorer\\PageSetup";
            bool bolWritable = true;
            string strName = "header";
            object oValue = "";
            string strName1 = "footer";
            object oValue1 = "";
            string strName2 = "margin_top";
            object oValue2 = "0.75";
            string strName3 = "margin_right";
            object oValue3 = "0.75";
            string strName4 = "margin_bottom";
            object oValue4 = "0.75";
            string strName5 = "margin_left";
            object oValue5 = "0.75";
 
            RegistryKey oKey = Registry.CurrentUser.OpenSubKey(strKey, bolWritable);
 
            oKey.SetValue(strName, oValue);
            Console.WriteLine("0 updated");
            oKey.SetValue(strName1, oValue1);
            Console.WriteLine("1 updated");
            oKey.SetValue(strName2, oValue2);
            Console.WriteLine("2 updated");
            oKey.SetValue(strName3, oValue3);
            Console.WriteLine("3 updated");
            oKey.SetValue(strName4, oValue4);
            Console.WriteLine("4 updated");
            oKey.SetValue(strName5, oValue5);
            Console.WriteLine("5 updated");
 
            oKey.Close();
            Console.ReadLine();
 
        }
    }
    class Program
    {
        static void Main(string[] args)
        {
           ie obj = new ie();
            obj.ChangeIEPageSetupSetting();
        }
    }
}

Note : - Your Web Application should have rights to change the registry settings.

Read More

June 18, 2013

The Generations of Computers

The Five Generations of Computers:===
Each  generation  of  computer  is  characterized  by a  major  technological development that fundamentally changed the way computers operate, resulting in increasingly  smaller,  cheaper,  more  powerful  and  more  efficient  and  reliable  devices.

First Generation (1940-1956) Vacuum Tubes :===  First  generation  computers  relied  on  machine language,  the  lowest-level  programming language understood by computers, to perform operations, and they  could  only  solve  one  problem  at  a  time.  Input  was  based  on  punched  cards  and paper  tape,  and  output  was  displayed  on  printouts.   The  UNIVAC  and ENIAC computers  are  examples  of  first-generation  computing  devices.  The  UNIVAC  was  the  first  commercial  computer  delivered  to  a  business  client,  the  U.S. Census Bureau in 1951.

Second Generation (1956-1963) Transistors :=== Second-generation  computers  moved  from  cryptic binary  machine  language  to symbolic,  or assembly,  languages,  which  allowed  programmers  to  specify instructions  in  words. High-level  programming  languages were  also  being  developed  at  this  time,  such  as  early  versions  of COBOL and FORTRAN.  These  were also the first computers that stored their instructions in their memory, which moved from a magnetic drum to magnetic core technology The  first  computers  of  this  generation  were  developed  for  the  atomic  energy  industry.

Third Generation (1964-1971) Integrated Circuits :=== The development of the  integrated  circuit  was the hallmark of the third generation of  computers.  Transistors  were miniaturized  and  placed  on silicon chips, called semiconductors,  which  drastically  increased  the  speed  and  efficiency  of computers.Instead  of  punched  cards  and  printouts,  users  interacted  with  third  gene ration computers  through keyboards and  monitorsand interfaced with  an operating system,  which  allowed  the  device  to  run  many  different applications at  one  time with  a  central  program  that  monitored  the  memory.  Computers  for  the  first  time became accessible to a mass audience because they were smaller and cheaper than their predecessors.

Fourth Generation (1971-Present) Microprocessors :===The  microprocessor brought  the  fourth  generation  of  computers,  as  thousands  of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer —from the central processing  unit and memory to input/output controls—on a single chip. In  1981 IBM introduced  its  first  computer  for  the  home  user,  and  in 1984 Apple  introduced  the  Macintosh.  Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began to use microprocessors. As these small computers became more powerful, they could be linked together to form  networks,  which  eventually  led  to  the  development  of  the  Internet.  Fourth generation computers  also  saw  the  development  of GUIs, the  mouse and  handhelddevices
.
Fifth Generation (Present and Beyond) Artificial Intelligence :===Fifth  generation  computing  devices,  based  on artificial  intelligence,  are  still  in development,  though  there  are  some  applications,  such  as   voice  recognition,  that are being used today. The use of parallel processing and superconductors is helping to  make  artificial  intelligence  a  reality.  Quantum  computation and  molecular and  nanotechnology will radically change the face of computers in years to come. The  goal  of  fifth-generation  computing  is  to  develop  devices  that  respond to natural  language  input and are capable of learning and self-organization.                                                               

Read More

June 14, 2013

Important Computer Questions for Banking Exams

Following set of Computer Questions related to Banking Exams like PO/CLERK/IBPS.below 33 Computer Question will help you to crack your computer awareness paper in banking sector.Computer Awareness paper is a mandatory paper for banking exams. so below question will be helpful for examinees. Answers are at the last of page..


1. A firewall is ........
1) A software program
2) A virus program
3) A Hardware
4) All the above
5) Only 1 and 3

2. Which of the following memory can be erased using Ultra Violet Rays?
1) RAM
2) ROM
3) PROM
4) EPROM
5) EEPROM

3. Which of the following is an input device which is used with interactive graphics to locate a place on the screen?
1) Bus
2) Modem
3) Magnetic Tape
4) Mouse
5) Scanner

4. Retrieval of information from a computer is called:
1) Output
2) Input
3) Data
4) Information
5) Processing

5. GUI is the acronym for:
1) Generation User Interface
2) General User Interface
3) Graphical User Instruction
4) Graphical User Interface
5) None of these

6. Internal Memory in a Central Processing Unit Comprises of which of the following?
1) Bus
2) A set of ALUs
3) A set of registers
4) Ward disk memory
5) All of these

7. Which of the following is a file in computer?
1) Hard disk
2) Magnetic Drum
3) Floppy disk
4) Portable Document Format
5) None of these

8. Which of the following terms is associated with the computers processing speed?
1) MIPS
2) FCFS
3) MPEG
4) TIFF
5) None of these

9. The smallest storage unit in a computer is...
1) Nibble
2) Byte
3) Bit
4) Word
5) None of these

10. Which function calculates the average of a given set of numbers in Excel?
1) Min
2) Max
3) Count
4) Avg
5) Sum


11. ...... shows all the websites and pages that are visited over a period of time.
1) Home page
2) Toolbar
3) Task bar
4) History
5) Cookies

12. Which among the following is a diskette?
1) Cartridge
2) Toner
3) Floppy
4) CD
5) Hard Disk

13. Excel is a collection of
1) Workbook
2) Worksheets
3) Graphs
4) Charts
5) None of these above

14. Four of the following five are alike in a certain way and so form a group. Which is the one that does not belong to the group?
1) MESH
2) SAFARI
3) AVANT
4) GOOGLE CHROME
5) MOZILLA FIREFOX

15. Ctrl + H keyboard short cut in MS word is used to ....
1) Open Font dialog box
2) Align Center
3) Open Replace Box
4) Insert Link
5) None of these

16. Track Ball and Light pen are examples of
1) Input devices
2) Output Devices
3) Input/Output
4) Name of Video game
5) None of these

17. Which of the following features make UNIX Operating System popular?
1) Multi tasking
2) Multi-user
3) Reliable
4) All
5) None of these

18. Which of the following is a part of Central Processing Unit?
1) Printer
2) Keyboard
3) Mouse
4) Arithmetic and Logic unit
5) None of these

19. A computer connected to a Local Area Network can:
1) Run faster
2) Be accessed online
3) Share information and/or share peripheral equipment
4) Be used to send Email
5) None of these

20. Timing and Control unit is a part of a(n) ....
1) Arithmetic Logic Unit
2) Processor
3) Memory
4) CMOS
5) BIOS

21. Which of the following controls the way in which the computer system functions and provides a means by which users can interact with the computer?
1) Platform
2) Operating System
3) Mother Board
4) Application Software
5) None of these

22. System software is the set of programs that enables the computer's hardware devices and ....... software to work together.
1) Management
2) Processing
3) Utility
4) Application
5) None of these

23. The ...... turns into different shapes depending upon the task being performed.
1) Active tab
2) Insertion point
3) Mouse pointer
4) ribbon
5) None of these

24. Using Print preview would be of help to the user when he/she wants to:
1) Colour the document
2) Save the document
3) Delete the document
4) Copy the document
5) View how the document will appear when printed

25. Compatibility, with respect to computers, refers to:
1) the software doing the right job for the user
2) the software being versatile enough to handle the job
3) the software being able to run on the computer
4) the software running only with other previously installed software
5) the software permanently available in the computer

26. The higher the resolution of a monitor, the
1) larger the pixels
2) less clear the screen is
3) further apart the pixels
4) closer together are the pixels
5) None of these

27. Mahesh and Pavan are employees of company X working in different countries, on the same project. Which of the following Computer technologies would be useful for them to have Review meets monthly?
1) Video-display software
2) Video digitizing
3) Video Conferencing
4) Video Scanning
5) None of these

28. A received E-mail may be :
1) Read
2) Unread
3) Stored
4) All the above
5) None of these


29. ..... is an icon that opens a folder of icons for all the resources on the computer like hard drive and printer?
1) My documents
2) Recycle bin
3) My computer
4) Accessories
5) None of these

30. ............... is a device or a software in a computer, that determines the next network point to which a packet is forwarded towards its destination.
1) Switch
2) Network
3) Bridge
4) Router
5) None of these

31. Which of the following is the standard interactive and programming language for getting information from a database?
1) DCOM
2) Java
3) SQL
4) Cova
5) Mercury

32. A hyperlink can be ......
1) Text
2) Image
3) Paragraph
4) All the above
5) None of these

33. The range of frequencies that a communication signal occupies is referred to as
1) Bandwidth
2) Frequency
3) Amplitude
4) Range
5) Rate

34. CPU is a/an .....
1) Expansion card
2) Mother board
3) Microprocessor
4) Memory
5) Graphic Card

35. Which of the following is true about Fire wall?
1) It is a Virus
2) It is an Antivirus
3) It is a software that logs internet activity
4) A filter for an internet connection
5) A search engine

36. Which of the following products/softwares is not associated with Microsoft?
1) Microsoft Silverlight
2) Windows CE
3) Surface Tablet
4) Windows Live
5) All are associated with Microsoft.

ANSWERS:

1-5; 2-4; 3-4; 4-1; 5-4; 6-3; 7-4; 8-1; 9-3; 10-4;
11-4; 12-3; 13-2; 14-1; 15-3; 16-1; 17-4; 18-4; 19-3; 20-2;
21-2; 22-4; 23-3; 24-5; 25-3; 26-4; 27-3; 28-4; 29-3; 30-4;
31-3; 32-4; 33-1; 34-3; 35-4; 36-5.


Read More

© 2011-2016 Techimpulsion All Rights Reserved.


The content is copyrighted to Tech Impulsion and may not be reproduced on other websites.