Q.An email that appeats to bave been originated from one source when it was actually sent from another source
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q.VOIP is a technology for
Ans: Making telephone calls over the internet
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
QQ.Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. is called
Ans : Cyber Stalking
Q. When using Microsoft Word , How can you increase the font size of selected text by one point every time ?
Ans: By pressing Ctrl+]
Q.An email that appeats to bave been originated from one source when it was actually sent from another source
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
Q. The practice of storing regularly used computer data on multiple servers that can be accesssed through the internet is called
Ans: Cloud Computing
Q. The widely criticized section in the IT Act 2000 that allegedly curbs the freedom of expression of individuals through electronic media
Ans: 66-A
Q.What is the main objective of the IT Act 2000 in india
Ans: To provide lagal recognition for transactions carried out by means of electronic data inter-change
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q.VOIP is a technology for
Ans: Making telephone calls over the internet
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
QQ.Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. is called
Ans : Cyber Stalking
Q. When using Microsoft Word , How can you increase the font size of selected text by one point every time ?
Ans: By pressing Ctrl+]
Q.An email that appeats to bave been originated from one source when it was actually sent from another source
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
Q. The practice of storing regularly used computer data on multiple servers that can be accesssed through the internet is called
Ans: Cloud Computing
Q. The widely criticized section in the IT Act 2000 that allegedly curbs the freedom of expression of individuals through electronic media
Ans: 66-A
Q.What is the main objective of the IT Act 2000 in india
Ans: To provide lagal recognition for transactions carried out by means of electronic data inter-change
No comments:
Post a Comment