Amazon Web Services
Oracle Cloud
Google Cloud
Digilocker
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
Send fake mails
Send Spam
Hack Email
All of the above
Virus
Bacteria
Tram
Spam
Ladger
Wallet
Hash
Praman authority
Java
Python
C++
Visual Basic for Applications (VBA)
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Bullying
Stalking
Identity theft
Phishing
Web Service
Softwares
All of the mentioned
Internet
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Norton
K7
Quick heal
All of these
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Malware
Spyware
Confidentiality
Integrity
Availability
Hacking
Creative writing
Complex decision-making
Data entry from spreadsheets to databases
Physical labor in a factory
4,3
3,4
2,4
3,2
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
Register
Encoder
Decoder
Flip Flop
Taste
Smell
Hearing
Touch
2012
2005
2008
2010
.c
.py
.exe
.jar
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Giga byte
Mega byte
Meta byte
Kilo byte
Malicious Intent
Sabotage
Accident Errors
Espionage Agents
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
International mobile equipment identify
Internet mobile equipment identify
International mobile equipment identity
None of these
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Hackers
Worm
Learning
Training
Designing
Puzzling
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
To ignore data variety and focus only on volume
Attacks on confidentiality
Attacks on integrity
Attacks on property
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
All of the Above
viruses
spyware
worm
adware
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
To reduce the size of the dataset
o increase data complexity
To clean, transform, and prepare data for analysis
To randomly sample the dataset
Software
Sensors, Actuator
WIFI Technique
Centralization
Transparency
Closed network
Single point of failure
A type of computer hardware
A digital currency
A distributed ledger technology
An operating system
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Ignorance
Trojan horses
Adware
Crackers
Cyber attack
Computer security
Cryptography
Digital hacking
Mining
Trading
Investing
Storing
Security patches
Refresh patches
Security breath fixes
Software as a Server
Server as a Service
Software as a Service
Server as a Software
A type of computer virus
A security protocol
Hardware
Both Hardware and Software
None of These
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot