1.
Which one below is a design principal?
Correct Answer
D. Contrast
Explanation
Contrast is a design principle that refers to the arrangement of opposite elements, such as light and dark, big and small, or rough and smooth, to create visual interest and emphasis. It helps to highlight important elements and create a sense of hierarchy in a design. By using contrast, designers can make their designs more dynamic and visually appealing, as well as improve readability and clarity.
2.
Which one below is a design element?
Correct Answer
A. Shape
Explanation
Shape is a design element because it refers to the outline or form of an object or element in a design. It is one of the fundamental visual elements that designers use to create compositions. Shapes can be geometric or organic, and they play a crucial role in defining the overall structure and balance of a design. By using different shapes, designers can create visual interest, convey meaning, and guide the viewer's eye within a composition.
3.
Tick the check box(s) that contain the design elements in the following image:
Correct Answer(s)
B. GrapHic
D. Line
E. Colour
G. Text
Explanation
The design elements present in the given image are Graphic, Line, Colour, and Text. These elements can be identified by visually analyzing the image. The image includes a graphic element, which is represented by the visual elements or shapes present. It also contains lines, which can be seen in the form of borders or outlines. The image has different colors, indicating the presence of the color element. Lastly, there is text incorporated into the image, making it another design element.
4.
True or False: SQLinjection is a URL based attack?
Correct Answer
A. True
Explanation
SQL injection is a type of attack where an attacker inserts malicious SQL code into a website's database query through user input fields. This can be done through URL parameters, forms, or any other input method. Therefore, SQL injection can indeed be a URL based attack as it involves manipulating the URL to inject malicious code into the database query.
5.
Which attacks are URL based?
Correct Answer
F. All of the above
Explanation
All of the attacks listed in the options are URL based. Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), Cross Site Scripting (XSS), and Remote Code Execution (RCE) all involve manipulating or exploiting URLs to carry out the attack. LFI and RFI involve including local or remote files respectively by manipulating the URL. SQLi involves injecting malicious SQL code into a URL to manipulate a database. XSS involves injecting malicious scripts into a URL to execute on a victim's browser. RCE involves exploiting vulnerabilities in a URL to execute malicious code on a remote server.
6.
The term ________ refers to a specefic group of people within the market at which a product or service is aimed at.
Correct Answer
Target Audience
Target Market
Target Group
Explanation
The term "target audience" refers to a specific group of people within the market that a product or service is aimed at. Similarly, "target market" and "target group" also refer to the same concept. All three terms are used interchangeably to describe the intended recipients of a product or service, highlighting the importance of identifying and understanding the needs and preferences of this particular group in order to effectively market and sell to them.
7.
What component in the CPU performs logical and mathematical tasks?
Correct Answer
D. Arithmetic Logical Unit (ALU)
Explanation
The Arithmetic Logical Unit (ALU) is responsible for performing logical and mathematical tasks in the CPU. It carries out operations such as addition, subtraction, multiplication, and comparison. The ALU takes input from the registers and performs the required calculations based on the instructions given by the control unit. It then outputs the result back to the registers or to the memory. The ALU is an essential component in the CPU that enables it to execute various mathematical and logical operations efficiently.
8.
Devices such as a:
-
Printer
-
Monitor
-
Speakers
-
Mouse
-
Keyboard
Are not peripheral devices.
Correct Answer
B. False
Explanation
The given statement is false. Devices such as a printer, monitor, speakers, mouse, and keyboard are peripheral devices. Peripheral devices are external devices that connect to a computer and provide input, output, or storage capabilities. These devices are not an integral part of the computer system but are used to enhance its functionality.
9.
Tick the check boxes of hardware that is located within a computer:
Correct Answer(s)
B. Central Processing Unit (CPU)
C. Random Access Memory (RAM)
D. Hard Drive (HDD)
E. Motherboard
Explanation
The hardware components located within a computer include the Central Processing Unit (CPU), Random Access Memory (RAM), Hard Drive (HDD), and Motherboard. These components are essential for the functioning of a computer system, with the CPU being responsible for executing instructions, RAM for temporary data storage, HDD for long-term data storage, and the motherboard acting as the main circuit board connecting all the components together.