Send fake mails
Send Spam
Hack Email
All of the above
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Virus
Antivirus
Malware
Hacking
Public Cloud
Private Cloud
Hybrid Cloud
Machine learning
Robotics
Nanotechnology
Natural language processing
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Norton
K7
Quick heal
All of these
अनà¥à¤®à¤¾à¤ªà¤•ता
Data security and privacy
Limited storage capacity
Data quality and integrity
Cyber attack
Computer security
Cryptography
Digital hacking
Ignorance
Trojan horses
Adware
Crackers
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
Confidentiality
Integrity
Availability
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Firewall
Antivirus software
Encryption
Intrusion detection system (IDS)
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these
Software as a Server
Server as a Service
Software as a Service
Server as a Software
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Password
Keycard
Retina
Fingerprint
Software
Sensors, Actuator
WIFI Technique
All of the Above
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Giga byte
Mega byte
Meta byte
Kilo byte
Hadoop
Intranet
Web Applications
All of the mentioned
System access control
System design
Data access control
None of above
Steve Jobs
Bill Gates
John Mashey
John Bredi
4,3
3,4
2,4
3,2
Denial of Service (DoS) Attacks
Access Violations
Both a and b
Polymorphism
Virtualization
Abstraction
None of the mentioned
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Hackers
Spam
Worm
Google Drive
Dropbox
OneDrive
USB Flash Drive
Mainframe computers
Traditional relational databases
Cloud computing and distributed computing platforms
Personal computers
One Time Password
Once and twice password
On time Password
None of the above
Socket
Pipe
Port
Machine
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
Arduino
Tablet
Table
Laptop
International mobile equipment identify
Internet mobile equipment identify
International mobile equipment identity
Performance
Reliability
Security
Longevity
System as a Service
Software as a Solution
Solution as a System
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Virtual vertigo
Simulator sickness
Reality nausea
Cyber dizziness
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
2012
2005
2008
2010
Creative writing
Complex decision-making
Data entry from spreadsheets to databases
Physical labor in a factory
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Bullying
Stalking
Identity theft
Phishing