1 |
Why do hackers break into the other's comptuer system. |
- A. To steal importnat data
- B. To destroy the system
- C. Both a and b
- D. None of these
|
2 |
A --------- is a trail of data of a user tha he leaves while using the intenet. |
- A. Bullying
- B. Virus
- C. Digital Foot prints
- D. Foot prints
|
3 |
Learning conducted via electronic media typicaly on internet is called. |
- A. Blog
- B. Meta
- C. Web-service
- D. e-learning
|
4 |
It refers to the spoolingof bulk mail by an unidentified source. |
- A. Spamming
- B. Phishing
- C. Hacking
- D. Cyber Troll
|
5 |
We can adopt the following meausres to avoid email hacking. |
- A. Keep changing your passwords
- B. Keep updating your operating system
- C. Don't plug into devices you are not sure about
- D. All of these
|
6 |
A---------------- is type of software or malware that spreads between several computers and corrupts data. |
- A. Spam
- B. Cracker
- C. Bullying
- D. Virus
|
7 |
---------------- refers to the act of breaking into systems to steal or distroy data. |
- A. Spamming
- B. Hacking
- C. Cracking
- D. Cyber troll
|
8 |
Styding from home through the internet is called. |
- A. <div>I- Learning</div>
- B. e- learning
- C. c- learning
- D. All of these
|
9 |
At its ismplest, ......... is a sysgtem of moral principles. |
- A. Ethics
- B. Digital Environment
- C. E-mail spoofing
- D. None of these
|
10 |
------- is a technique used by cyber criminals to gain the information from the dividuals. |
- A. Cracking
- B. Bullying
- C. Social Engineering
- D. Spamming
|