1. The Server key is always kept ___.
A) Public
B) Private
C) Both A & B
D) None
Answer) B) Private
2. What Cyber Ethics mean
A) Cyber Crime
B) Online Security
C) Rules and Regulations to Follow Online
D) Online Fraud
Answer) C) Rules and Regulations to Follow Online
3. What is the full form of (DoS)
A) Digital of Service
B) Denial of Service
C) Disconnection of Service
D) None
Answer) B) Denial of Service
4. ___ is where a hacker forces your computer to redirect to a fake website.
A) Phishing
B) Pharming
C) Redirecting
D) Redirection
Answer) B) Pharming
5. HTTPS means the website is
A) Secure
B) Insecure
C) Trusted
D) Harmful
Answer) A) Secure
6. Padlock symbol or 'HTTPS' shows while opening a website means
A) It is encrypted and secure
B) Not Encrypted
C) SSL is there
D) Both A and C
Answer) D) Both A and C
7. SSL stands for
A) Secure Security Layer
B) Secure Socket Lamination
C) Secure Socket Layer
D) Secure Data Transmission
Answer) C) Secure Socket Layer
8. TLS stands for
A) Transport Layer Socket
B) Transport Lamination Socket
C) Transfer Layer Security
D) Transport Layer Security
Answer) D) Transport Layer Security
9. This is a hardware or software security device/system that filters information passing between internal and external networks. If in some cases it detects any suspicious data packet it destroys or terminates the data packet.
A) Data encryption
B) Firewall
C) SSL
D) TLS
Answer) B) Firewall
10. ___ is a process of using computing and communication technologies to transfer data from one place to another and vice versa.
A) Internet
B) Networking
C) Data communications
D) Data transmission
Answer) C) Data communications
11. This is an etiquette or protocol and is defined as a set of rules for acceptable online behavior.
A) Netiquette
B) Cyber security
C) Online safety
D) SSL
Answer) A) Netiquette
A) Intellectual Property Rights
B) Online Property Rights
C) Content Rights
D) Original Content Rights
Answer) A) Intellectual Property Rights
13. Using someone else's exact words without using quotation marks or an illustration is an example of
A) Plagiarism
B) Hacking
C) Privacy
D) Stealing
Answer) A) Plagiarism
14. It refers to keeping someone's personal information or something protected or hidden from others Online.
A) Security
B) Protection of personal information
C) Privacy
D) None of the above
Answer) C) Privacy
15. Software whose source code is publicly available and anyone can modify it and redistribute the copies with or without change.
A) Open Source Software
B) Source code Software
C) Executable Software
D) Both B and C
Answer) A) Open Source Software
16. What implies the gap among access and in access to Information and Communication Technology
A) Lack of ICT
B) Lack of Internet
C) Digital Divide
D) None of the above
17. Ram uses software that can modify its source code. The type of software he uses is
A) Open Source Software
B) Source code Shareable Software
C) Executable Software
D) Both B and C
Answer) A) Open Source Software
18. Plagiarism can be avoided by
A) Paraphrasing
B) Quoting
C) Referencing
D) All of the above
Answer) D) All of the above
19. FoI stands for
A) Freedom of Internet
B) Freedom of Information
C) Freedom of ICT
D) None of the above
Answer) B) Freedom of Information
20. A _____ can spread without a host program.
A) Computer Virus
B) Computer Worm
C) Malware
D) Spyware
Answer) B) Computer Worm
21. ___ is any kind of unwanted online communication.
A) Worm
B) Adware
C) Virus
D) Spam
Answer) D) Spam
22. Trojan horse is a
A) Malware
B) Virus
C) Adware
D) Both A and B
Answer) D) Both A and B
23. It tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you have visited.
A) Virus
B) Worm
C) Spyware
D) Adware
Answer) D) Adware
24. This is software that is downloaded onto your computer to track your activities without your knowledge. This information is then sent to a remote source.
A) Spyware
B) Spam
C) Trojan
D) Adware
Answer) A) Spyware
25) In India, the Freedom of Information Act was implemented in
A) 1991
B) 2001
C) 2004
D) 2002
Answer) D) 2002
A) Do Citing
B) Do Quote of it
C) Paraphrase it
D) Both A and B
Answer) D) Both A and B
27. GNU stands for
A) GNU Next Unix
B) GNU's Not Unix
C) GNU Now Unix
D) None of the above
Answer) B) GNU's Not Unix
28. Using strong characters in passwords, is a
A) Netiquette
B) Precaution
C) Awareness
D) None of the above
Answer) A) Netiquette
29. Shyam visited an e-commerce website in which there is no padlock symbol or HTTPS protocol.
Can Shyam buy some goods from that
e-commerce website.
A) Yes, it is safe
B) Definitely No, there is a higher risk of fraud or personal data loss and should leave that website immediately
C) Not sure
D) None of the above
Answer) B) Definitely No, there is a higher risk of fraud or personal data loss and should leave that website immediately
30. A _______________ is the right given by the government to an inventor to protect his/her
an invention from being used/copied for a fixed period of time.
A) Copyright
B) Intellectual Property
C) Patent
D) Trademark
Answer) C) Patent
No comments:
Post a Comment