Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Spam
Cookies
Malware
Adware
SIM
GPS
Both A andB
None
Security
Reliability
Performance
None of these
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
Google
Microsoft
OpenAI
Amazon
Entertainment
Training and simulation
Social networking
Financial analysis
Man made
Naturally occur
Machine made
All of the above
4,3
3,4
2,4
3,2
Longevity
Java
Python
C++
Visual Basic for Applications (VBA)
viruses
spyware
worm
adware
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
To ignore data variety and focus only on volume
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Arduino
Tablet
Table
Laptop
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-1, C-2, D-4
A-4, B-3, C-2, D-1
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-1, B-2, C-3, D-4
is not easily available
for computer-to-computer exchange of business documents in a structured format.
is not popular
defines only a transmission protocol
Spyware
Hadoop
Intranet
Web Applications
All of the mentioned
Machine learning
Robotics
Nanotechnology
Natural language processing
Socket
Pipe
Port
Machine
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Mining
Trading
Investing
Storing
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Taste
Smell
Hearing
Touch
Hackers
Virus
Worm
The process of encoding plaintext into ciphertext
The process of decoding ciphertext into plaintext
The process of analyzing weather data
The process of generating random numbers
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
None of the above
.c
.py
.exe
.jar
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Centralization
Transparency
Closed network
Single point of failure
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Ladger
Wallet
Hash
Praman authority
Volume
Velocity
Variety
Validity
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
Virtual vertigo
Simulator sickness
Reality nausea
Cyber dizziness
Match the cybersecurity threats with their descriptions.
1 → A, 2 → D, 3 → B, 4 → C
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → A, 3 → D, 4 → B
1 → E, 2 → F, 3 → B, 4 → A
Norton
K7
Quick heal
All of these
Google Drive
Dropbox
OneDrive
USB Flash Drive
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Public Cloud
Private Cloud
Hybrid Cloud