1 This kind of attack involves altering raw data just before a
computer processes it and then changing it back after the
processing is completed
a. data diddling
b. Salami attacks
c. Virus attack
d. web jacking
2. This refers to environmentally sustainable computing of IT
a. Electronic Computing
b. Cloud Computing
c. Green Computing
d. EEE
4. This is a person who gains unauthorized access to a computer
network for profit, criminal mischief, or personal pleasure
a. hacker
b. Cracker
c. Cyber Fraud
d. Computer Programmer
5. Which is the following does not come under cyber Crime
a. Cyber Defamation
b. Cyber Stalking
c. Forgery
d. Online Chatting
6. First World War came to an end by
a) Treaty of Versilles
b) Treaty of Vienna
c) Treaty of Utrecht
d) Treaty of West Phalia
7. Who started free software foundation?
a. Linus Torvald
b. Richard M Stallman
c. GNG
d. None of these
8. The addiction towards unlimited information available on the internet
a. Information Overload
b. Cyber Crime
c. Internet hacking
d. Cyber stalking
a. data diddling
b. Salami attacks
c. Virus attack
d. web jacking
2. This refers to environmentally sustainable computing of IT
a. Electronic Computing
b. Cloud Computing
c. Green Computing
d. EEE
3.. A set of legal provisions to regulate the activities of the cyber space or internet known as
a. Cyber laws
b. Cyber ethics
c. Cyber Crime
d. Cyber Connections
a. Cyber laws
b. Cyber ethics
c. Cyber Crime
d. Cyber Connections
a. hacker
b. Cracker
c. Cyber Fraud
d. Computer Programmer
5. Which is the following does not come under cyber Crime
a. Cyber Defamation
b. Cyber Stalking
c. Forgery
d. Online Chatting
6. First World War came to an end by
a) Treaty of Versilles
b) Treaty of Vienna
c) Treaty of Utrecht
d) Treaty of West Phalia
7. Who started free software foundation?
a. Linus Torvald
b. Richard M Stallman
c. GNG
d. None of these
8. The addiction towards unlimited information available on the internet
a. Information Overload
b. Cyber Crime
c. Internet hacking
d. Cyber stalking
Comments
Post a Comment