Firewall
Encryption
Antivirus software
Phishing
Spam
Cookies
Malware
Adware
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
System as a Service
Software as a Solution
Software as a Service
Solution as a System
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
.c
.py
.exe
.jar
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Software
Sensors, Actuator
WIFI Technique
All of the Above
Hardware
Both Hardware and Software
None of These
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
A type of computer hardware
A digital currency
A distributed ledger technology
An operating system
Cyber attack
Computer security
Cryptography
Digital hacking
POST
DELETE
TRACE
GET
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Send fake mails
Send Spam
Hack Email
All of the above
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
Learning
Training
Designing
Puzzling
SIM
GPS
Both A andB
None
2012
2005
2008
2010
Analyzing data with a small number of variables
Analyzing data that exceeds the processing capacity of traditional database systems
Analyzing data stored in physical files
Analyzing data using handwritten calculations
Security
Performance
Storage
All of above
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Ladger
Wallet
Hash
Praman authority
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Confidentiality
Integrity
Availability
Hacking
Hackers
Virus
Worm
Hadoop
Intranet
Web Applications
All of the mentioned
Reliability
None of these
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
Google Drive
Dropbox
OneDrive
USB Flash Drive
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Taste
Smell
Hearing
Touch
Ransomware
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Spyware
Ignorance
Trojan horses
Crackers
Password
Keycard
Retina
Fingerprint
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Steve Jobs
Bill Gates
John Mashey
John Bredi
Entertainment
Training and simulation
Social networking
Financial analysis
Polling
Job Scheduling
Protection
File Management
One Time Password
Once and twice password
On time Password
None of the above
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Virtual vertigo
Simulator sickness
Reality nausea
Cyber dizziness
Trojans
All of these