Page-9 |
|||
Cyber Safety |
|||
121)Any criminal activity done over internet or through electronic devices is termed as ________ | |||
electronic crime | cyber crime | ||
social media crime | cyber law | ||
Answer : | |||
|
|||
122)The records or traces of someone's online activity is termed as ___________ | |||
digital footprint | cyber law | ||
cyber crime | social media crime | ||
Answer : | |||
|
|||
123)When someone is harassed over internet, it is called_________ | |||
phishing | identity thept | ||
cyber stalking | digital footprint | ||
Answer : | |||
|
|||
124)A small file on user's computer where visited websites store own information is called__________ | |||
spam | virus | ||
cookies | malware | ||
Answer : | |||
|
|||
125)The fraud that involves using someone else's indenty is termed as _______ | |||
plagiarism | spamming | ||
cyber bullying | identity theft | ||
Answer : | |||
|
|||
126)When something is posted in social media using someone else's ID, it will be termed as _______ | |||
cyber bullying | identity theft | ||
phishing | plagiarism | ||
Answer : | |||
|
|||
127)Which one of the following is correct about social media etiquettes? | |||
Someone should be reliable | Someone should be authentic | ||
Someone should be secure | All of these | ||
Answer : | |||
|
|||
|
|||
128)Analysis and use of digital data for digital evidence is termed as ___________ | |||
digital forensics | digital investigation | ||
digital crime | e-forensics | ||
Answer : | |||
|
|||
129)Showing appropriate and ethical behaviours in online activities is termed as _________ | |||
cyber safety | cyber ethics | ||
cyber law | cyber security | ||
Answer : | |||
|
|||
130)Spot the odd one from the following. | |||
X | |||
gmail | |||
Answer : | |||
|
|||
131)Which one of the following is not cybercrime? | |||
Online forgery | Data theft | ||
Installing anti virus | Installing trojan horse | ||
Answer : | |||
|
|||
132)What is cybercrime? | |||
The theft of digital information | Any crime that involves computer and network | ||
Any crime that uses computer to jeopardise national security | The use of computer network to commit financial fraud | ||
Answer : | |||
|
|||
133)To avoid tracking and storing cookies, the private browsing open a website in _________ mode. | |||
duplicate | public | ||
secured | incognito | ||
Answer : | |||
|
|||
134)Which one of the following is not a cybercrime? | |||
Identity theft | Phishing | ||
Child pornography | Downvoting a social media post | ||
Answer : | |||
|
|||
135)Which one of the following is not a computer virus? | |||
Code red | ILOVEYOU | ||
Kaspersky | MyDoom | ||
Answer : | |||
|