Saturday, January 19, 2013
Odesk Adobe Photoshop CS3 Test Answer
Question: 1
What happens when Use Legacy is selected as shown in the
given picture?
a.
It is used to apply
proportionate
(nonlinear) adjustments to image pixels (Ans)
b.
When it is selected,
Brightness/Contrast
simply shifts all pixel values higher or lower when adjusting brightness
c. Both a and b
d.
None of the above
Question: 2
Channels can not be added to which of the following image
modes?
a. RGB
b. CMYK
c. Bitmap (Ans)
d. Lab
Question: 3
a. True (Ans)
b. False
Question: 4
Which option will you select to convert Types to Shapes?
a.
Choose Select > Type >
Convert to
Shape
b.
Select a type layer. Right
click and
select Convert to Shape from the list
c.
Select a type layer. Choose
Layer >
Type > Convert To Shape
d.
Both b and c (Ans)
Question: 5
In which Format will you save your file to preserve the
Alpha channels?
a. PDF
b. PICT
c. Pixar
d.
All of the above (Ans)
Question: 6
Which file format can be used to save Lab images?
a. Photoshop Raw
b. TIFF
c.
Large Document Format (PSB)
d.
All of the above (Ans)
Question: 7
Refer to the given image.
Which of the following options displays the Spot Channels in
the Channels palette?
a. A
b. B (Ans)
c. C
d.
All of the above
Question: 8
Which option will you select to remove the existing profile
from the document in the given image?
a. A
b. B
c. C (Ans)
d.
None of the above
Question: 9
Photoshop supports a maximum pixel dimension of 300,000 by
300,000 pixels per image.
a. True (Ans)
b. False
Question: 10
Which option will you choose to refresh a Histogram?
a.
Double-click anywhere in the
Histogram
b.
Click the Cached Data Warning
icon
c.
Click the Uncached Refresh
button
d.
All of the above (Ans)
Question: 11
Which keyboard shortcut (windows) will you choose to
permanently Clear History (no Undo)?
a.
Control + Shift + Z
b.
Control + Alt + Z
c.
Shift + Clear History
d.
Alt + Clear History (Ans)
Question: 12
Variable names contain spaces and special characters.
a. True
b. False (Ans)
Question: 13
Which View will you choose to display a Histogram with no
controls or statistics?
a. Expanded View
b. Compact View
c.
All Channels View
d.
All of the above (Ans)
Question: 14
Which option will you select to export layers?
a.
Choose File > Scripts >
Export
Layers To Files (Ans)
b.
Choose File > Export >
Export
Layers To Files
c.
Choose File > Place >
Export
Layers To Files
d.
All of the above
Question: 15
When you create a new image with the transparent content,
the image does not have a background layer.
a. True
b. False (Ans)
Question: 16
Which of the given options displays an Action Safe Area?
a. A
b. B
c.
Both a and b (Ans)
d.
None of the above
Question: 17
Which of the following is not true about the Multichannel
mode?
a.
Multichannel mode images
contain 256
levels of gray in each channel and are useful for specialized printing
(Ans)
b.
When you convert images to
the
Multichannel mode, the color channels in the original image become spot
color
channels in the converted image
c.
Converting an RGB image to
the
Multichannel mode creates cyan, magenta, and yellow spot channels
d.
None of the above
Question: 18
Which keyboard shortcut (windows) will you choose to select
the History Brush tool?
a. Y (Ans)
b. R
c. O
d. H
Question: 19
When will the Dynamic shortcuts appear in the Character
Palette Menu as shown in the picture?
a.
When you are entering the
Point type
b.
When you are entering the
Paragraph type
c.
When the I-beam is in text
d.
All of the above (Ans)
Question: 20
The individual Histograms in the All Channels View does not
include which of the following?
a. Alpha channels
b. Spot channels
c. Masks
d.
All of the above (Ans)
Question: 21
Which among the following is not a right option for
selecting a web-safe color from the Color Palette?
a.
Choose Make Ramp Web Safe
from the Color
Palette Menu
b.
Choose Web Color Sliders from
the Color
Palette Menu
c.
Choose Current Color from the
Color
Palette Menu (Ans)
d.
All of the above
Question: 22
Which of the following is not a Color Adjustment command?
a.
Adjustment command (Ans)
b.
Color Balance command
c.
Selective Color command
d. Levels command
Question: 23
Which option, when in a checked state, displays a message
whenever you open an untagged document?
a. A
b. B
c. C
d.
None of the above (Ans)
Question: 24
You cannot arrange the stacking order of the Auto slices.
a. True (Ans)
b. False
Question: 25
You cannot create Work paths from the fonts that do not
include the outline data.
a. True (Ans)
b. False
Question: 26
Which among the following Methods adds pixels by averaging
the color values of the surrounding pixels and produces medium-quality results?
a. A (Ans)
b. B
c. C
d. D
Question: 27
What do you mean by kerning?
a.
It is the process of adding
or
subtracting spaces between specific pairs of characters
b.
It is the process of
loosening or
tightening the spacing between the characters in a selected text or an
entire
block of text
c. Both a and b
d.
None of the above
Question: 28
You cannot transform the background layer.
a. True
b. False
Question: 29
The mask created by the Replace Color command is permanent.
a. True
b. False
Question: 30
What is the colored box in the Navigator Palette known as?
a. View area
b. Proxy area
c.
Navigation area (Ans)
d.
Proxy preview area
Question: 31
In which format will you save your document to preserve the
Perspective Plane Information in an image while working with the vanishing
point, as shown in the given picture?
a. PSD
b. TIFF
c. JPEG
d.
All of the above (Ans)
Question: 32
Which type of images are resolution-dependent?
a. Bitmap images
b.
Vector images (Ans)
c. Both a and b
d.
None of the above
Question: 33
Which of the following is not a type of Variable?
a.
Image variables (Ans)
b.
Visibility variables
c.
Pixel Replacement variables
d.
Text Replacement variables
Question: 34
The Rotate Canvas command does not work on which of the
following
a.
Individual layers
b. Paths
c.
Selection borders
d.
All of the above (Ans)
Question: 35
Which of the following Slices is created with the Slice
Tool?
a. Auto slices
b.
User slices (Ans)
c.
Layer-based slices
d.
None of the above
Question: 36
Which option will you select to remove an effect from a
style?
a.
In the Layers Palette, drag
the Effects
Bar to the Delete icon
b.
Choose Layer > Layer style
> Clear
Layer Style
c.
Select the Layer, and then
click the
Clear Style button at the bottom of the Styles palette
d.
All of the above (Ans)
Question: 37
Which Command lets you free memory, used by the Undo
command, the History Palette, or the Clipboard?
a. Paths
b. Place
c. Purge (Ans)
d.
Place scale marker
Question: 38
Which Animation mode shows the frame duration and keyframed
layer properties of the videos and animations in a Timeline?
a. Timeline (Ans)
b. Frame
c. Both a and b
d.
None of the above
Question: 39
Which of the following options displays Temporary Work Path
in the Paths palette?
a. A
b. B
c. C
d.
All of the above (Ans)
Question: 40
Which of the following Filters cannot be applied to a Smart
Object?
a. Stylize
b. Texture
c.
Pattern Maker (Ans)
d.
All of the above
Question: 41
Which of the following is not true about the Curves dialog
box?
a.
You can use the Curves dialog
box to
adjust the entire tonal range of an image
b.
The Curves dialog box lets
you adjust up
to 14 different points throughout an image's tonal range (Ans)
c.
In the Curves dialog box, the
tonal
range is represented as a straight diagonal baseline
d.
None of the above
Question: 42
A Motion Picture film has a frame rate of how many fps?
a. 29.97
b. 23.976
c. 25
d. 24 (Ans)
Question:43
Which file format saves a document of any size as well as
preserves all the Photoshop features?
a. Photoshop Raw
b. PSD
c. TIFF
d.
All of the above (Ans)
Question:44
Which of the given file formats works with the Image
Processor?
a. PSD
b. JPEG
c.
Camera raw files
d.
All of the above (Ans)
Question:45
Refer to the given image.
Which of the given options displays Converts to Timeline
mode in an Animation palette?
a. A
b. B (Ans)
c. C
d. D
Question:46
Which of the following Layer properties can be animated?
a. Position
b. Opacity
c. Style
d.
All of the above (Ans)
Question:47
Which of the given options displays the Modal control in the
Actions palette?
a. A
b. B
c. C (Ans)
d. D
Question:48
Auto Blend Layers is available for which of the following modes?
a. RGB
b.
Grayscale images
c. Both a and b
d.
None of the above (Ans)
Question:49
Which among the following files, saved in the Adobe
Photoshop format, is used by the filter to create the displacement maps?
a. Flat file
b. Bump file
c. Flattened file
d.
Displace file (Ans)
Question:50
Color Dodge, Color Burn, Lighten, Darken, Difference, and
Exclusion blending modes do not work on Lab images.
a. True (Ans)
b. False
Question:51
In which of the given instances, a caution icon appears next
to the layer comp name as shown in the picture?
a.
When you delete a layer
b.
When you merge a layer
c.
When you convert a layer to a
background
d.
All of the above (Ans)
Question:52
Which type of information is not displayed by the Info
Palette?
a.
It does not display the
opacity of the
current layer
b.
It does not display
information on the
amount of RAM and Scratch Disk used to process the image
c.
It does not display 8-bit,
16-bit, or
32-bit values (Ans)
d.
None of the above
Question:53
Which among the following QuickTime Video formats is
supported by Photoshop extended?
a. MPEG-4
b. MOV (Ans)
c. MPEG-1
d.
All of the above
Question:54
Which of the given options displays left indent in the
Paragraph palette?
a. A
b. B (Ans)
c. C
d. D
Question:55
Which option will you select to display a file at 100% size?
a. Choose View > Actual Pixels
b.
Choose View > Fit on
Screen
c.
Choose View > Print Size
d.
All of the above (Ans)
Question:56
By default, Masks applied to Smart objects are linked to
Smart object layers.
a. True (Ans)
b. False
Question:57
Which among the following Modes does not support layers?
a. Multichannel
b. Bitmap
c.
Indexed Color Mode
d.
All of the above (Ans)
Question:58
Why do we select Remember Palette Locations option as shown
in the given image?
a. To display palettes in their last
locations on startup (Ans)
b.
To display palettes in their
default
locations on startup
c. Both a and b
d.
None of the above
Question:59
Refer to the given image.
Which of the given options displays the Set Tsume option in
the Character Palette?
a. A (Ans)
b. B
c. C
d. D
Question:60
Which among the following is not a Duotone mode type?
a. Pantone (Ans)
b. Monotone
c. Tritone
d. Quadtone
Question:61
State whether True or False:
Changing units on the Info Palette automatically changes the
units on Rulers.
a. True (Ans)
b. False
Question:62
Anti-aliasing option is available for which of the given
Tools?
a.
Elliptical Marquee tool
b. Magic Wand tool
c.
Magnetic Lasso tool
d.
All of the above (Ans)http://9xwebtech.blogspot.com/2013/01/odesk-adobe-photoshop-cs3-test-answer.html
oDesk Search Engine Optimization Test Answers
Question: 1
|
Which
of the following search engines or directories provides the
directory
search results for Yahoo? |
Ans: B
|
Question: 2
|
Which of the following statements regarding website content
are correct?
|
Ans: A
|
Question: 3
|
What is Keyword Density?
|
Ans: D
|
Which of the following statements about the Google Sitemap are
correct:
|
Ans: A
|
Question: 5
|
Are RSS/Atom feeds returned in Google’s search results?
|
Ans: B
|
Question: 6
|
What does the term Keyword Prominence refer to?
|
Ans: C
|
Question: 7
|
Which of the following factors does Google take into account
while assessing whether or not a website is an authority website? |
Ans: A,B,C
|
Question: 8
|
What is Anchor Text?
|
Ans: C
|
Question: 9
|
If you search for the term “iq test” in the Word Tracker
keyword
suggestion tool, will it return the number of independent searches for the term “iq”? |
Ans: B
|
Question: 10
|
What is the illegal act of copying of a page by unauthorized
parties
in order to filter off traffic to another site called? |
Ans: D
|
Question: 11
|
Do search engines such as Google detect unnatural linking
patterns by checking
the Class C IP address of the page where the link to the website originates? |
Ans: A
|
Question: 12
|
What term is commonly used to
describe the shuffling of positions in search
engine results in
between major updates? |
Ans: B
|
Question: 13
|
While grading your website, Google gives credit to outbound
links pointing
to authority websites? |
Ans: B
|
Question: 14
|
Which of the following URLs can the Google search engine
spider?
|
Ans: E
|
Question: 16
|
What does the 302 server response code signify?
|
Ans: D
|
Question: 17
|
Which of the following statements is correct with regard to
the description meta tag?
|
Ans: D
|
Question: 18
|
State whether true or false.The Yahoo Directory listing is a
free service for commercial sites.
|
Ans: A
|
Question: 19
|
Which of the following statements is correct with regard to
the images within a webpage?
|
Ans: B
|
Question: 20
|
Cloaking is a
controversial SEO technique. What does it involve?
|
Ans: B
|
Question: 21
|
Which of the following facts about Alexa are correct?
|
ANS: A
|
Question: 22
|
Google looks down upon paid links for enhancing page rank.
If a website sells links what action/s does Google recommend to avoid being penalized? |
Ans: C
|
Question: 23
|
Which of the following actions could get you banned by Google?
|
Ans: A
|
Question: 24
|
Which of the following statements about Google’s technical and
quality guidelines is true?
|
Ans: B
|
Question: 25
|
Which of the following is an
ethical SEO Technique?
|
Ans: D
|
Question: 26
|
All major search engines are case sensitive.
|
Ans: B
|
Question: 27
|
While optimizing your website it is important to generate the
right type of
traffic how does the Bounce Rate information help in this regard? |
Ans: B
|
Question: 28
|
Which of the following factors contribute towards link
popularity of a website?
|
Ans: A,B,C,D
|
Question: 29
|
Search engines do not index some common words
(such as “or”, “and”,“when”, and “in”) within the webpage. What are these common words called? |
Ans: D
|
Question: 30
|
Which of the following activities could be looked down upon by
Google as per their quality guidelines? |
Ans: B,C
|
Question: 31
|
Which of the following statements about RSS are correct?
|
Ans: A
|
Question: 32
|
_________ is usually the best web page to get linked to while
receiving a
themed in-bound link from another website. |
Ans: D
|
Question: 33
|
Which of the following can be termed as good keyword selection
and placement strategies?
|
ANS: A, D
|
Question: 34
|
If your site is not appearing in
Google search results because of someunethical SEO practices in the recent past, _________________. |
Ans: D
|
Question: 35
|
Which of the
following statements about search engine optimization techniques are
correct:
|
Ans: A, B, D
|
Question: 36
|
A Hallway Page is used to:
|
Ans: D
|
Question: 37
|
Which of the following free tools/websites
could help you identify which city in the world has the largest search for the keyword – “six sigma”? |
Ans: D
|
Question: 38
|
How are site maps
important for the search engine optimization process?
|
Ans: C
|
Question: 39
|
State whether the following statement is true or false
.A Sitemap provides a list of internal links to user accessible pages on a website. |
Ans: A
|
Question: 40
|
What is the function of “indexer” part of the Google search
engine?
|
Ans: D
|
Question: 41
|
Which of the following conditions will Google treat favorably
from the ‘Relevancy’ perspective?
|
Ans: D
|
Question: 42
|
Some words, when followed by a colon, have special meanings to
Yahoo
.What is performed by the link: operator? |
ANS: C
|
Question: 43
|
Which of the following factors have an impact on the Google Page Rank?
|
ANS: A
|
Question: 44
|
What is the term for Optimization strategies that are in an
unknown area of reputability/validity?
|
ANS: C
|
Question: 45
|
Why is it a bad idea from the seo perspective to host free
articles and
write ups that are very common on the internet. |
ANS: B
|
Question: 46
|
The following robots meta tag directs the search engine
bots:<META <br>NAME=”robots” CONTENT=”noindex,nofollow”> |
ANS: B
|
Question: 47
|
_________________ use both crawlers and directories to
generate relevant results.
|
ANS: D
|
Question: 48
|
Which of the following statements is correct with regard to
natural links?
|
ANS: C
|
Question: 49
|
What will happen if you type the words ‘Certification
-Networking’ in the Google search box?
|
ANS: D
|
Question: 50
|
If you enter ‘Help site:www.microsoft.com’ in the Google
search box, what will Google search for?
|
ANS: B
|
Question: 51
|
Which of the following statements about FFA pages are true?
|
ANS: B
|
Question: 52
|
What is the name of the search engine technology
due to which a query for the word ‘actor’ will also show search results for related words such as actress, acting or act? |
ANS: D
|
Question: 53
|
If a website’s search engine saturation with respect to a
particular search engine is 20%, what does it mean?
|
NS: A
|
Question: 54
|
What is the main reason for the effectiveness of optimizing a
webpage towards a long tail keyword search?
|
ANS: A
|
Friday, January 18, 2013
Computer Viruses Intraduction
Computer Viruses Intraduction
What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
firefox using internet connection Speed
speed up your internet connection using firefox
1. Type “about:config” into the address bar and hit return. Scroll
down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxreq uests
Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.
2. Alter the entries as follows:
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining ” to “true”
Set “network.http.pipelining.maxre quests” to some number like 30. This
means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer.
Name it “nglayout.initialpaint.delay” and set its value to “0?.
This value is the amount of time the browser waits before it acts on information it recieves.
If you’re using a brodband connection you’ll load pages 2-3 times faster now.
1. Type “about:config” into the address bar and hit return. Scroll
down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxreq
Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.
2. Alter the entries as follows:
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining
Set “network.http.pipelining.maxre
means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer.
Name it “nglayout.initialpaint.delay” and set its value to “0?.
This value is the amount of time the browser waits before it acts on information it recieves.
If you’re using a brodband connection you’ll load pages 2-3 times faster now.
Gmail account using shortcuts keys
Operate Gmail account using shortcuts keys
Shortcut keys Action
f Press simple f help you to forward email message to
next
Shift+I Use to mark email message as read
Shift+u Use to mark email message as unread
r Reply to the sender of mail
a Reply to the all email recipients
Ctrl+c Use to save current email as draft
Z Press z key to undo any previous action
? Display the keyboard shortcut keys help
c Press c button to compose an new email message
/ Press / button to move your cursor in search box
u Press u key to refresh your email account to view latest email
! Press ! key to mark an email message as spam
p Press p key to move cursor to precious message
. Press . key to display more options
Esc Escape cursor from any current field.
Shortcut keys Action
f Press simple f help you to forward email message to
next
Shift+I Use to mark email message as read
Shift+u Use to mark email message as unread
r Reply to the sender of mail
a Reply to the all email recipients
Ctrl+c Use to save current email as draft
Z Press z key to undo any previous action
? Display the keyboard shortcut keys help
c Press c button to compose an new email message
/ Press / button to move your cursor in search box
u Press u key to refresh your email account to view latest email
! Press ! key to mark an email message as spam
p Press p key to move cursor to precious message
. Press . key to display more options
Esc Escape cursor from any current field.
Subscribe to:
Posts (Atom)