Giga byte
Mega byte
Meta byte
Kilo byte
System as a Service
Software as a Solution
Software as a Service
Solution as a System
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
2012
2005
2008
2010
Hardware
Software
Both Hardware and Software
None of These
Firewall
Antivirus software
Encryption
Intrusion detection system (IDS)
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-4, B-3, C-2, D-1
Google Drive
Dropbox
OneDrive
USB Flash Drive
Ignorance
Trojan horses
Adware
Crackers
Norton
K7
Quick heal
All of these
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
System access control
System design
Data access control
None of above
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
Platform as a Server
Product as a Service
Platform as a Service
Program as a Service
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
Phishing
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Polling
Job Scheduling
Protection
File Management
Learning
Training
Designing
Puzzling
Searching.
Heuristics.
Pattern recognition.
Parallel processing.
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
All of the Above
Malware
Spyware
None of these
Virus
Bacteria
Tram
Spam
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
Fraudulently acquiring sensitive information.
An encryption technique
An anti-spam technique
A password building technique
Confidentiality
Integrity
Availability
Hacking
Mining
Trading
Investing
Storing
Software as a Server
Server as a Service
Server as a Software
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
1 → A, 2 → D, 3 → B, 4 → C
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Ladger
Wallet
Hash
Praman authority
Hadoop
Intranet
Web Applications
All of the mentioned
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
POST
DELETE
TRACE
GET
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Polymorphism
Virtualization
Abstraction
None of the mentioned
Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
Antivirus
Taste
Smell
Hearing
Touch
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
All of the above
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Bitcoin
Ethereum
Ripple
Anti virus
Cookies
Cyber safety
Arduino
Tablet
Table
Laptop