Computer Model Questions - 01
1. What's expansion of Virus?
Ans: Vital Information Resource under Siege.
2. First Known Computer Virus?
Ans: Creeper
3. When was Creeper Virus Released?
Ans: 1971
4. A program designed to prevent, search for, detect and remove s/w viruses and other malicious s/w is called _____?
Ans: Anti Virus
5. Changing of data before or during entry into the computer system is called ____?
Ans: Data Diddling.
6. Hacking is an offences as per IT Act 2000 Section _____?
Ans: 66
7. An act of using telephone in an attempt to scan the user into surrendering private and financial credentials is called _____?
Ans: Vishing
8. Cyber phishing activity by using Mobile SMS is called _____?
Ans: Smishing
9. Ethical computer hackers are called as _____?
Ans: White Hat Hackers
10. Hackers who breaks security of a system for non malicious reasons like testing their own system are called _____?
Ans: White Hat Hackers.
11. Hackers who breaks security of a system for malicious intend are called _____?
Ans: Black Hat Hackers.
12. Hackers who intrude for the sole purpose of notifying the administrator about a security defect in the system are called _____?
Ans: Grey Hat Hackers
13. Those who work in a computer are _____?
Ans: Live ware
14. National Cyber Security Policy Started in India in the year?
Ans: 2013
15. Computer Literacy Day in India is observed on:
Ans: 2nd December
16. First Computer virus infected Microsoft Operating System was _____?
Ans: Brain
17. Programs that are designed to display advt on your computer, redirect your research request to advertising websites etc are called _____?
Ans: Adware
18. Act of changing electronic information into an unreadable state by using algorithms is called _____?
Ans: Data Encryption.
19. India's first cyber forensic lab is situated in:
Ans: Tripura
20. The initiative by Govt. of Kerala to fight against Cyber terrorism and cyber attacks is ______?
Ans: CERT-K
Ans: Vital Information Resource under Siege.
2. First Known Computer Virus?
Ans: Creeper
3. When was Creeper Virus Released?
Ans: 1971
4. A program designed to prevent, search for, detect and remove s/w viruses and other malicious s/w is called _____?
Ans: Anti Virus
5. Changing of data before or during entry into the computer system is called ____?
Ans: Data Diddling.
6. Hacking is an offences as per IT Act 2000 Section _____?
Ans: 66
7. An act of using telephone in an attempt to scan the user into surrendering private and financial credentials is called _____?
Ans: Vishing
8. Cyber phishing activity by using Mobile SMS is called _____?
Ans: Smishing
9. Ethical computer hackers are called as _____?
Ans: White Hat Hackers
10. Hackers who breaks security of a system for non malicious reasons like testing their own system are called _____?
Ans: White Hat Hackers.
11. Hackers who breaks security of a system for malicious intend are called _____?
Ans: Black Hat Hackers.
12. Hackers who intrude for the sole purpose of notifying the administrator about a security defect in the system are called _____?
Ans: Grey Hat Hackers
13. Those who work in a computer are _____?
Ans: Live ware
14. National Cyber Security Policy Started in India in the year?
Ans: 2013
15. Computer Literacy Day in India is observed on:
Ans: 2nd December
16. First Computer virus infected Microsoft Operating System was _____?
Ans: Brain
17. Programs that are designed to display advt on your computer, redirect your research request to advertising websites etc are called _____?
Ans: Adware
18. Act of changing electronic information into an unreadable state by using algorithms is called _____?
Ans: Data Encryption.
19. India's first cyber forensic lab is situated in:
Ans: Tripura
20. The initiative by Govt. of Kerala to fight against Cyber terrorism and cyber attacks is ______?
Ans: CERT-K
No comments:
Post a Comment