1 |
Learning conducted via electronic media typicaly on internet is called. |
- A. Blog
- B. Meta
- C. Web-service
- D. e-learning
|
2 |
Why do hackers break into the other's comptuer system. |
- A. To steal importnat data
- B. To destroy the system
- C. Both a and b
- D. None of these
|
3 |
---------------- refers to the act of breaking into systems to steal or distroy data. |
- A. Spamming
- B. Hacking
- C. Cracking
- D. Cyber troll
|
4 |
At its ismplest, ......... is a sysgtem of moral principles. |
- A. Ethics
- B. Digital Environment
- C. E-mail spoofing
- D. None of these
|
5 |
The internet is also called the network of |
- A. Computers
- B. Network
- C. Mobiles
- D. Tablets
|
6 |
The best defence against............ assaults is human intellect and comprehension. |
- A. Phishing
- B. Spamming
- C. Hacking
- D. Social engineering
|
7 |
------------- are virtual diaries created by people for share their hobbies, thoughts with like minded people. |
- A. Internet
- B. Meta
- C. Spam
- D. Blogs
|
8 |
Which of the following are not transaction fraud. |
- A. Identity theft
- B. Cyber troll
- C. Job Fraud
- D. Banking Fraud
|
9 |
We can adopt the following meausres to avoid email hacking. |
- A. Keep changing your passwords
- B. Keep updating your operating system
- C. Don't plug into devices you are not sure about
- D. All of these
|
10 |
The----- provides you the sebrvices of online shopping, education and etc. |
- A. Network
- B. Internet
- C. Both a and b
- D. None of these
|