Question: 1
|
Which
of the following search engines or directories provides the
directory
search results for Yahoo? |
Ans: B
|
Question: 2
|
Which of the following statements regarding website content
are correct?
|
Ans: A
|
Question: 3
|
What is Keyword Density?
|
Ans: D
|
Which of the following statements about the Google Sitemap are
correct:
|
Ans: A
|
Question: 5
|
Are RSS/Atom feeds returned in Google’s search results?
|
Ans: B
|
Question: 6
|
What does the term Keyword Prominence refer to?
|
Ans: C
|
Question: 7
|
Which of the following factors does Google take into account
while assessing whether or not a website is an authority website? |
Ans: A,B,C
|
Question: 8
|
What is Anchor Text?
|
Ans: C
|
Question: 9
|
If you search for the term “iq test” in the Word Tracker
keyword
suggestion tool, will it return the number of independent searches for the term “iq”? |
Ans: B
|
Question: 10
|
What is the illegal act of copying of a page by unauthorized
parties
in order to filter off traffic to another site called? |
Ans: D
|
Question: 11
|
Do search engines such as Google detect unnatural linking
patterns by checking
the Class C IP address of the page where the link to the website originates? |
Ans: A
|
Question: 12
|
What term is commonly used to
describe the shuffling of positions in search
engine results in
between major updates? |
Ans: B
|
Question: 13
|
While grading your website, Google gives credit to outbound
links pointing
to authority websites? |
Ans: B
|
Question: 14
|
Which of the following URLs can the Google search engine
spider?
|
Ans: E
|
Question: 16
|
What does the 302 server response code signify?
|
Ans: D
|
Question: 17
|
Which of the following statements is correct with regard to
the description meta tag?
|
Ans: D
|
Question: 18
|
State whether true or false.The Yahoo Directory listing is a
free service for commercial sites.
|
Ans: A
|
Question: 19
|
Which of the following statements is correct with regard to
the images within a webpage?
|
Ans: B
|
Question: 20
|
Cloaking is a
controversial SEO technique. What does it involve?
|
Ans: B
|
Question: 21
|
Which of the following facts about Alexa are correct?
|
ANS: A
|
Question: 22
|
Google looks down upon paid links for enhancing page rank.
If a website sells links what action/s does Google recommend to avoid being penalized? |
Ans: C
|
Question: 23
|
Which of the following actions could get you banned by Google?
|
Ans: A
|
Question: 24
|
Which of the following statements about Google’s technical and
quality guidelines is true?
|
Ans: B
|
Question: 25
|
Which of the following is an
ethical SEO Technique?
|
Ans: D
|
Question: 26
|
All major search engines are case sensitive.
|
Ans: B
|
Question: 27
|
While optimizing your website it is important to generate the
right type of
traffic how does the Bounce Rate information help in this regard? |
Ans: B
|
Question: 28
|
Which of the following factors contribute towards link
popularity of a website?
|
Ans: A,B,C,D
|
Question: 29
|
Search engines do not index some common words
(such as “or”, “and”,“when”, and “in”) within the webpage. What are these common words called? |
Ans: D
|
Question: 30
|
Which of the following activities could be looked down upon by
Google as per their quality guidelines? |
Ans: B,C
|
Question: 31
|
Which of the following statements about RSS are correct?
|
Ans: A
|
Question: 32
|
_________ is usually the best web page to get linked to while
receiving a
themed in-bound link from another website. |
Ans: D
|
Question: 33
|
Which of the following can be termed as good keyword selection
and placement strategies?
|
ANS: A, D
|
Question: 34
|
If your site is not appearing in
Google search results because of someunethical SEO practices in the recent past, _________________. |
Ans: D
|
Question: 35
|
Which of the
following statements about search engine optimization techniques are
correct:
|
Ans: A, B, D
|
Question: 36
|
A Hallway Page is used to:
|
Ans: D
|
Question: 37
|
Which of the following free tools/websites
could help you identify which city in the world has the largest search for the keyword – “six sigma”? |
Ans: D
|
Question: 38
|
How are site maps
important for the search engine optimization process?
|
Ans: C
|
Question: 39
|
State whether the following statement is true or false
.A Sitemap provides a list of internal links to user accessible pages on a website. |
Ans: A
|
Question: 40
|
What is the function of “indexer” part of the Google search
engine?
|
Ans: D
|
Question: 41
|
Which of the following conditions will Google treat favorably
from the ‘Relevancy’ perspective?
|
Ans: D
|
Question: 42
|
Some words, when followed by a colon, have special meanings to
Yahoo
.What is performed by the link: operator? |
ANS: C
|
Question: 43
|
Which of the following factors have an impact on the Google Page Rank?
|
ANS: A
|
Question: 44
|
What is the term for Optimization strategies that are in an
unknown area of reputability/validity?
|
ANS: C
|
Question: 45
|
Why is it a bad idea from the seo perspective to host free
articles and
write ups that are very common on the internet. |
ANS: B
|
Question: 46
|
The following robots meta tag directs the search engine
bots:<META <br>NAME=”robots” CONTENT=”noindex,nofollow”> |
ANS: B
|
Question: 47
|
_________________ use both crawlers and directories to
generate relevant results.
|
ANS: D
|
Question: 48
|
Which of the following statements is correct with regard to
natural links?
|
ANS: C
|
Question: 49
|
What will happen if you type the words ‘Certification
-Networking’ in the Google search box?
|
ANS: D
|
Question: 50
|
If you enter ‘Help site:www.microsoft.com’ in the Google
search box, what will Google search for?
|
ANS: B
|
Question: 51
|
Which of the following statements about FFA pages are true?
|
ANS: B
|
Question: 52
|
What is the name of the search engine technology
due to which a query for the word ‘actor’ will also show search results for related words such as actress, acting or act? |
ANS: D
|
Question: 53
|
If a website’s search engine saturation with respect to a
particular search engine is 20%, what does it mean?
|
NS: A
|
Question: 54
|
What is the main reason for the effectiveness of optimizing a
webpage towards a long tail keyword search?
|
ANS: A
|
Saturday, January 19, 2013
oDesk Search Engine Optimization Test Answers
Friday, January 18, 2013
Computer Viruses Intraduction
Computer Viruses Intraduction
What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
What is a Computer Virus ?
A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :-
The different types of viruses are as follows-
1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.
2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.
3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.
4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.
5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.
6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.
firefox using internet connection Speed
speed up your internet connection using firefox
1. Type “about:config” into the address bar and hit return. Scroll
down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxreq uests
Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.
2. Alter the entries as follows:
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining ” to “true”
Set “network.http.pipelining.maxre quests” to some number like 30. This
means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer.
Name it “nglayout.initialpaint.delay” and set its value to “0?.
This value is the amount of time the browser waits before it acts on information it recieves.
If you’re using a brodband connection you’ll load pages 2-3 times faster now.
1. Type “about:config” into the address bar and hit return. Scroll
down and look for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxreq
Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.
2. Alter the entries as follows:
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining
Set “network.http.pipelining.maxre
means it will make 30 requests at once.
3. Lastly right-click anywhere and select New-> Integer.
Name it “nglayout.initialpaint.delay” and set its value to “0?.
This value is the amount of time the browser waits before it acts on information it recieves.
If you’re using a brodband connection you’ll load pages 2-3 times faster now.
Gmail account using shortcuts keys
Operate Gmail account using shortcuts keys
Shortcut keys Action
f Press simple f help you to forward email message to
next
Shift+I Use to mark email message as read
Shift+u Use to mark email message as unread
r Reply to the sender of mail
a Reply to the all email recipients
Ctrl+c Use to save current email as draft
Z Press z key to undo any previous action
? Display the keyboard shortcut keys help
c Press c button to compose an new email message
/ Press / button to move your cursor in search box
u Press u key to refresh your email account to view latest email
! Press ! key to mark an email message as spam
p Press p key to move cursor to precious message
. Press . key to display more options
Esc Escape cursor from any current field.
Shortcut keys Action
f Press simple f help you to forward email message to
next
Shift+I Use to mark email message as read
Shift+u Use to mark email message as unread
r Reply to the sender of mail
a Reply to the all email recipients
Ctrl+c Use to save current email as draft
Z Press z key to undo any previous action
? Display the keyboard shortcut keys help
c Press c button to compose an new email message
/ Press / button to move your cursor in search box
u Press u key to refresh your email account to view latest email
! Press ! key to mark an email message as spam
p Press p key to move cursor to precious message
. Press . key to display more options
Esc Escape cursor from any current field.
Registry Washer 5.0.2.36 Full + Crack, Serial Key, Keygen
Registry Washer 5.0.2.36 Full + Crack, Serial Key, Keygen
Pc registry Appliance 5.0.2.36 | 5.2 MbWhat exactly is a Microsoft windows registry? For computers with a Microsoft Microsoft windows based pc, the Os is the database that stores many of your system's configuration settings and options. Imagine it as a vital part of your pc's brain.
Software applications on your pc rely on important information stored in your Os to perform a variety of tasks. But over time, as you add, remove, and modify the files and settings of these applications, your registry begins to lose its shape. This can leave you with a variety of obsolete, damaged, and even harmful registry records. When left unchecked, your program can become increasingly unstable, running slower and crashing more frequently.
That's where Pc registry Appliance an "award-winning" registry fix program comes in and saves the day!
Registry Appliance gives you a robust registry scan engine that allows you to safely scan your entire Os for errors and other problems that can interfere with your pc's performance. After identifying the problems that require action, Pc registry Appliance helps you resolve those issues and get your pc back to running efficiently.
But that's not all Pc registry Appliance can do! Pc registry Appliance also includes a variety of other system-maintenance tools to help optimize your pc's performance, including a quick and easy Microsoft windows Start-up Administrator, Pc registry Monitor, BHO Administrator, Complete Pc registry Back-up, Complete System Back-up, and MORE!
Registry Appliance Benefits
Improve the rate as well as of your pc by locating and repairing problems within your Microsoft windows registry
Locate in a flash registry records using the lightning-fast search Os tool
Monitor which applications access your Os quickly.
Receive alerts of applications that make changes to your registry so that you can 'undo' any malicious or unauthorized entries
Easily control all your Internet Explorer BHO components and stop hidden spyware, adware, and other types of malware from interfering with your system
Speed up your Microsoft windows registry's performance by analyzing, rebuilding, and compressing its information, thereby removing the gaps and damaged keys that slow it down
Perform a complete backup of your entire program prior to installing any program so that if things don't work out, simply roll your program back to the restore point and it's business as usual!
Speed up your Microsoft windows Start-up time by selecting which applications you want to run at startup, and stop the ones you don't
Quickly locate and safely uninstall applications you don't use or need, freeing up valuable disk space and improving your pc's performance
Registry Appliance Key Features:
Registry Scanner:
· Pc registry Washer's Pc registry Scanner safely scans your entire Os and pinpoints all Os invalid records and errors. With a few mouse clicks, you can then either fix or remove the reported invalid records and errors
Search Registry:
· Pc registry Washer's Search Pc registry feature quickly scans your Os keys and values for any given value. You'll be amazed at the rate of Pc registry Appliance search registry engine!
Startup Manager:
· Some applications automatically boot up when Microsoft windows starts up--and they're useful for your day-to-day computer activities. Others, however, just slow down your Microsoft windows startup and overall program performance, and you might not even be able to start all of them up correctly
· With Pc registry Washer's Start-up Administrator, you have full control on all Microsoft windows startup applications and can easily select which program to start and which not to, every time your pc starts up
BHO Manager:
· Some BHOs are legitimate and add functionality to your Internet Explorer; some, however, are malware, adware, or spyware. Pc registry Washer's BHO manager gives you full control over all installed BHO components and allow you to easily enable/ disable any or all of them
Automatic Backup:
· To insure maximum safety for our users, Pc registry Appliance auotmatically backs up all fix operations, so that you can easily restore any previous Os fix operation with just few simple mouse clicks!
Registry Defragmentation:
· Over time, your pc can begin to slow down due to the accumulation of information in Os. With Pc registry Washer's Pc registry Defragmentation feature, you can improve the performance of your pc by analyzing, rebuilding, and compressing information in your Os, removing the gaps and damaged keys that drag your program down. With just a few clicks, Pc registry Appliance allows you to enjoy a faster, more efficient program.
Full System Backup:
· Whether you're installing a new application or game, you never have to worry about how adding the new application will affect your program. Pc registry Washer's Complete System Back-up feature makes it easy to back up your entire program from within Pc registry Appliance itself. If the installation of a new program doesn't go as planned, Pc registry Appliance ensures you have the vital restoration point needed to restore your pc back to its previous state.
http://adlock.in/f/http://adlock.in/f/
Subscribe to:
Posts (Atom)