1 |
The----- provides you the sebrvices of online shopping, education and etc. |
Network
Internet
Both a and b
None of these
|
2 |
Which of the following are not transaction fraud. |
Identity theft
Cyber troll
Job Fraud
Banking Fraud
|
3 |
The technique used by cybercriminals to attain information from individuals is called. |
Cyber bullying
Cyber troll
Social Engineering
All of these
|
4 |
We can adopt the following meausres to avoid email hacking. |
Keep changing your passwords
Keep updating your operating system
Don't plug into devices you are not sure about
All of these
|
5 |
Spamming refers to. |
Sending and email from an unidentified source
Sending wrong information
Sending bulk of information
None of these
|
6 |
Crimes that are committed through the internet are called. |
Fiber crimes
Internet crimes
Cyber crimes
None of these
|
7 |
Why do hackers break into the other's comptuer system. |
To steal importnat data
To destroy the system
Both a and b
None of these
|
8 |
A digital foot printis also known as. |
Digital diary
Digital dossier
Data base
None of these
|
9 |
Styding from home through the internet is called. |
<div>I- Learning</div>
e- learning
c- learning
All of these
|
10 |
The internet is also called the network of |
Computers
Network
Mobiles
Tablets
|