Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Anti virus
Cookies
Firewall
Cyber safety
Machine learning
Robotics
Nanotechnology
Natural language processing
Attacks on confidentiality
Attacks on integrity
Attacks on property
All of the above
Java
Python
C++
Visual Basic for Applications (VBA)
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
One Time Password
Once and twice password
On time Password
None of the above
Soft computing
Distributed computing
Hybrid computing
Cloud computing
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
Bullying
Stalking
Identity theft
Phishing
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
Hackers
Virus
Spam
Worm
International mobile equipment identify
Internet mobile equipment identify
International mobile equipment identity
None of these
Ignorance
Trojan horses
Adware
Crackers
Arduino
Tablet
Table
Laptop
Software
Sensors, Actuator
WIFI Technique
All of the Above
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Hardware
Both Hardware and Software
None of These
System as a Service
Software as a Solution
Software as a Service
Solution as a System
Denial of Service (DoS) Attacks
Access Violations
Both a and b
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Match the following security features with their functionalities.
A-2, B-1, C-4, D-3
A-3, B-4, C-1, D-2
A-4, B-3, C-2, D-1
A-1, B-2, C-3, D-4
Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
Security patches
Refresh patches
Security breath fixes
To reduce the size of the dataset
o increase data complexity
To clean, transform, and prepare data for analysis
To randomly sample the dataset
Socket
Pipe
Port
Machine
Password
Keycard
Retina
Fingerprint
Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
Volume
Velocity
Variety
Validity
Giga byte
Mega byte
Meta byte
Kilo byte
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
1 → A, 2 → D, 3 → B, 4 → C
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
.c
.py
.exe
.jar
Register
Encoder
Decoder
Flip Flop
viruses
spyware
worm
adware
अनà¥à¤®à¤¾à¤ªà¤•ता
Data security and privacy
Limited storage capacity
Data quality and integrity
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Security
Reliability
Performance
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
The process of encoding plaintext into ciphertext
The process of decoding ciphertext into plaintext
The process of analyzing weather data
The process of generating random numbers
Bacteria
Tram
Polymorphism
Virtualization
Abstraction
None of the mentioned
Cyber attack
Computer security
Cryptography
Digital hacking
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
Public Cloud
Private Cloud
Hybrid Cloud
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data