1 |
A---------------- is type of software or malware that spreads between several computers and corrupts data. |
- A. Spam
- B. Cracker
- C. Bullying
- D. Virus
|
2 |
Crimes that are committed through the internet are called. |
- A. Fiber crimes
- B. Internet crimes
- C. Cyber crimes
- D. None of these
|
3 |
The best defence against............ assaults is human intellect and comprehension. |
- A. Phishing
- B. Spamming
- C. Hacking
- D. Social engineering
|
4 |
Styding from home through the internet is called. |
- A. <div>I- Learning</div>
- B. e- learning
- C. c- learning
- D. All of these
|
5 |
The technique used by cybercriminals to attain information from individuals is called. |
- A. Cyber bullying
- B. Cyber troll
- C. Social Engineering
- D. All of these
|
6 |
The Website or programs known as..... is where users can share their content. |
- A. Internet
- B. Social Media
- C. Meta
- D. e- learning
|
7 |
It refers to the spoolingof bulk mail by an unidentified source. |
- A. Spamming
- B. Phishing
- C. Hacking
- D. Cyber Troll
|
8 |
At its ismplest, ......... is a sysgtem of moral principles. |
- A. Ethics
- B. Digital Environment
- C. E-mail spoofing
- D. None of these
|
9 |
A digital foot printis also known as. |
- A. Digital diary
- B. Digital dossier
- C. Data base
- D. None of these
|
10 |
------------- are virtual diaries created by people for share their hobbies, thoughts with like minded people. |
- A. Internet
- B. Meta
- C. Spam
- D. Blogs
|