Q. Hardware devices that are not part of the main computer system and are often added later to the system.
Ans : Peripheral Device
Q. A program that has capability to infect other programs and make copies of itself and spread into other programs is called
Ans: Virus
Q.An attack accomplished by using the internet break into computers and using them to attack a network is called
Ans: Distributed DoS
Q.Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. is called
Ans : Cyber Stalking
Q. When using Microsoft Word , How can you increase the font size of selected text by one point every time ?
Ans: By pressing Ctrl+]
Q.An email that appeats to bave been originated from one source when it was actually sent from another source
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q.VOIP is a technology for
Ans: Making telephone calls over the internet
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
QQ.Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. is called
Ans : Cyber Stalking
Q. When using Microsoft Word , How can you increase the font size of selected text by one point every time ?
Ans: By pressing Ctrl+]
Q.An email that appeats to bave been originated from one source when it was actually sent from another source
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
Q. The practice of storing regularly used computer data on multiple servers that can be accesssed through the internet is called
Ans: Cloud Computing
Q. The widely criticized section in the IT Act 2000 that allegedly curbs the freedom of expression of individuals through electronic media
Ans: 66-A
Q.What is the main objective of the IT Act 2000 in india
Ans: To provide lagal recognition for transactions carried out by means of electronic data inter-change
1. Act of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity is
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
2. Which section of IT Act covers most of the common crimes arising out of “Unauthorised Access”
a) Section 66 b) Section 67 c)Section 73 d) Section 74 e) None of these
3. Section 66F of IT Act deals with
a)Cyberstalking b) email bombing c) child pornography d) cyber terrorism e) DoS
4. The crime child pornography comes under
a) Section 66F b) Section 67B c)Section 67A d) Section 66 e) None of these
5. India's First case of cyber stalking registered at
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
6. use of electronic messaging systems to send unsolicited bulk messages is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
7.India's first cyber police station
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
8.Term used for a process to verify the validity of stolen card
a) skimming b) bullying c) carding d) Phishing e) sneaking
9.First Cyber Crime Police Station of Kerala state started functioning at
a) Kannur b) Thiruvananthapuram c) Kozhikode d) Malappuram e) Kochi
10. Use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
a) email bombing b) spamming c) Cyberstalking d) Phishing d) None of these
11. A challenge-response test used in computing as an attempt to ensure that the response is generated by a human being
a) skimmer b) captcha c) doodle d) Phishing e) None of these
12.sending numerous duplicate mails to the same email address
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
13. The famous personality Ankit Fadia is associated with
a) ethical hacking b) anti virus programs c) doodle d) Phishing e) None of these
14. person who attracts users to spam related websites by loading hidden copies of popular keywords
a) hacker b) cracker c) spammer d) spamdexter e) doodler
15. What SEO means
a) Software engineering object b) Search Engine Optimization c) Search Engine Output d) Software estimate optimizer e) None of these.
16. The Indian Parliament passed the Information Technology Bill, which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format, in the year:
(a)2000 b)2001 c)2002 d)2003 e)2004
17. .......... Is a computer connected to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort of another under remote direction.
a)Server b)Zombie c)Symbian d)None of these
Video Lesson
Ans : Peripheral Device
Q. A program that has capability to infect other programs and make copies of itself and spread into other programs is called
Ans: Virus
Q.An attack accomplished by using the internet break into computers and using them to attack a network is called
Ans: Distributed DoS
Q.Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. is called
Ans : Cyber Stalking
Q. When using Microsoft Word , How can you increase the font size of selected text by one point every time ?
Ans: By pressing Ctrl+]
Q.An email that appeats to bave been originated from one source when it was actually sent from another source
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q.VOIP is a technology for
Ans: Making telephone calls over the internet
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
QQ.Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc. is called
Ans : Cyber Stalking
Q. When using Microsoft Word , How can you increase the font size of selected text by one point every time ?
Ans: By pressing Ctrl+]
Q.An email that appeats to bave been originated from one source when it was actually sent from another source
Ans: E-mail Spoofing
Q.1 GB is equal to
Ans : 2 ^ 30
Q. What is the base of binary number system
Ans : 2
Q.Which of the following institution is credited with the development of www
Ans: CERN
Q. Digital Signature Certificates are issued by
Ans: Certification Agencies appointed by the office of the Controller of Certification Agencies
Q. The practice of storing regularly used computer data on multiple servers that can be accesssed through the internet is called
Ans: Cloud Computing
Q. The widely criticized section in the IT Act 2000 that allegedly curbs the freedom of expression of individuals through electronic media
Ans: 66-A
Q.What is the main objective of the IT Act 2000 in india
Ans: To provide lagal recognition for transactions carried out by means of electronic data inter-change
1. Act of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity is
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
2. Which section of IT Act covers most of the common crimes arising out of “Unauthorised Access”
a) Section 66 b) Section 67 c)Section 73 d) Section 74 e) None of these
3. Section 66F of IT Act deals with
a)Cyberstalking b) email bombing c) child pornography d) cyber terrorism e) DoS
4. The crime child pornography comes under
a) Section 66F b) Section 67B c)Section 67A d) Section 66 e) None of these
5. India's First case of cyber stalking registered at
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
6. use of electronic messaging systems to send unsolicited bulk messages is called
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
7.India's first cyber police station
a) Delhi b) Bangalore c) Chennai d) Mumbai e) Kochi
8.Term used for a process to verify the validity of stolen card
a) skimming b) bullying c) carding d) Phishing e) sneaking
9.First Cyber Crime Police Station of Kerala state started functioning at
a) Kannur b) Thiruvananthapuram c) Kozhikode d) Malappuram e) Kochi
10. Use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
a) email bombing b) spamming c) Cyberstalking d) Phishing d) None of these
11. A challenge-response test used in computing as an attempt to ensure that the response is generated by a human being
a) skimmer b) captcha c) doodle d) Phishing e) None of these
12.sending numerous duplicate mails to the same email address
a) email bombing b) spamming c) Cyberstalking d) Phishing e) None of these
13. The famous personality Ankit Fadia is associated with
a) ethical hacking b) anti virus programs c) doodle d) Phishing e) None of these
14. person who attracts users to spam related websites by loading hidden copies of popular keywords
a) hacker b) cracker c) spammer d) spamdexter e) doodler
15. What SEO means
a) Software engineering object b) Search Engine Optimization c) Search Engine Output d) Software estimate optimizer e) None of these.
16. The Indian Parliament passed the Information Technology Bill, which is regarded as the mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format, in the year:
(a)2000 b)2001 c)2002 d)2003 e)2004
17. .......... Is a computer connected to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious tasks of one sort of another under remote direction.
a)Server b)Zombie c)Symbian d)None of these
Video Lesson
No comments:
Post a Comment