Performance
Reliability
Security
None of the above
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
1 → A, 2 → D, 3 → B, 4 → C
Spell check it
Review it
Verify and validate it
Organise and simplify it
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Ignorance
Trojan horses
Adware
Crackers
Man made
Naturally occur
Machine made
All of the above
Microsoft
Amazon
IBM
Oracle
Public Cloud
Private Cloud
Hybrid Cloud
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
AI
Blockchain
Cloud
Big Data
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
To ignore data variety and focus only on volume
Send fake mails
Send Spam
Hack Email
Machine learning
Robotics
Nanotechnology
Natural language processing
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
computer-assisted design.
computer application design.
computer application and design.
computer-aided design.
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Google Drive
Dropbox
OneDrive
USB Flash Drive
Google
OpenAI
Arduino
Tablet
Table
Laptop
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Centralization
Transparency
Closed network
Single point of failure
Register
Encoder
Decoder
Flip Flop
Ladger
Wallet
Hash
Praman authority
Brute force of passwords
SIM swap attacks
SQL injection
Cross-site scripting
Spam
Cookies
Malware
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these
Bitcoin
Ethereum
Ripple
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Mainframe computers
Traditional relational databases
Cloud computing and distributed computing platforms
Personal computers
Software as a Server
Server as a Service
Software as a Service
Server as a Software
Socket
Pipe
Port
Machine
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
Hadoop
Intranet
Web Applications
All of the mentioned
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Virus
Security threat
Worm
System as a Service
Software as a Solution
Solution as a System
Bullying
Stalking
Identity theft
Phishing
4,3
3,4
2,4
3,2
Hackers
Longevity
Cyber attack
Computer security
Cryptography
Digital hacking
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
All of the Above
Downloading illegal software
Accessing hardware on a shared network
Stealing a network’s password
All are treated as Cyber Crime
Norton
K7
Quick heal
All of these
Virtual Machine
Neural Networks
Virtual Reality