1 |
The technique used by cybercriminals to attain information from individuals is called. |
Cyber bullying
Cyber troll
Social Engineering
All of these
|
2 |
We can adopt the following meausres to avoid email hacking. |
Keep changing your passwords
Keep updating your operating system
Don't plug into devices you are not sure about
All of these
|
3 |
Spamming refers to. |
Sending and email from an unidentified source
Sending wrong information
Sending bulk of information
None of these
|
4 |
Crimes that are committed through the internet are called. |
Fiber crimes
Internet crimes
Cyber crimes
None of these
|
5 |
Why do hackers break into the other's comptuer system. |
To steal importnat data
To destroy the system
Both a and b
None of these
|
6 |
A digital foot printis also known as. |
Digital diary
Digital dossier
Data base
None of these
|
7 |
Styding from home through the internet is called. |
<div>I- Learning</div>
e- learning
c- learning
All of these
|
8 |
The internet is also called the network of |
Computers
Network
Mobiles
Tablets
|
9 |
----- is simply a coputer making decisions basedon the information given to it. |
Programming
Artificial Intelligence
Program
Condition
|
10 |
A--------------- is somethign that must be true for something to happen |
Loop
Condition
Statement
Loop
|