5 Feb 2024 PRINCE ROHILLA 0 Comments Computer Education Quiz X-Marks (46) Q(1). If you want to 'Go to the previous presentation window' you will press: (A) Ctrl + Shift + F6 (B) Ctrl + F6 (C) Ctrl + Alt + F6 (D) None of These Q(2). For 'Maximize presentation window' you have to press: (A) Shift + F10 (B) Ctrl + F10 (C) Ctrl + Shift + F10 (D) None of These Q(3). For 'Maximize Power Point application window' you have to press: (A) Ctrl + Shift + F10 (B) Shift + F10 (C) Alt + F10 (D) None of These Q(4). For 'open existing presentation' you have to press: (A) Ctrl + N (B) Ctrl + O (C) Ctrl + K (D) None of These Q(5). An error in a computer program is called: (A) Hacking (B) Virus (C) Bug (D) None of These Q(6). ______was the first technique that posed a serious threat to virus scanners: (A) Vulnerability Code (B) Polymorphic Code (C) Antimorphic Code (D) None of These Q(7). A/an ______ is a system susceptibility or flaw: (A) Error (B) Vulnerability (C) Virus (D) None of These Q(8). _______vulnerability is one for which at least one working attack exists: (A) Democratic (B) Exploitable (C) Dominative (D) None of These Q(9). CVE stands for: (A) Common Vulnerabilities Exposures (B) Cyber Vulnerabilities Exposures (C) Cycolic Vulnerabilities Exposures (D) None of These Q(10). _____ is unauthorized access to or use of data, systems, server, or networks, including any attempt to probe, scan, or test the vulnerability of a system, server, or network, or to breach security or authentication measures without the express authorization of the owner of the system, server, or network: (A) Hacking (B) Cracking (C) Viruses (D) None of These Please provide your contact information to proceed.Email Address *First Name *Consent *Yes, I agree with the privacy policy and terms and conditions.Submit