Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
Mining
Trading
Investing
Storing
Web Service
Softwares
All of the mentioned
Internet
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
Security patches
Refresh patches
Security breath fixes
All of the above
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
Ladger
Wallet
Hash
Praman authority
Virus
Antivirus
Malware
Hacking
Platform as a Server
Product as a Service
Platform as a Service
Program as a Service
Norton
K7
Quick heal
All of these
Volume
Velocity
Variety
Validity
2012
2005
2008
2010
Bullying
Stalking
Identity theft
Phishing
One Time Password
Once and twice password
On time Password
None of the above
Software
Sensors, Actuator
WIFI Technique
All of the Above
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
Information Iot
Industrial Iot
Intelligent Iot
Innovative Iot
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Google
Microsoft
OpenAI
Amazon
Picture
File
Video
All the above
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Spam
Cookies
Adware
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Confidentiality
Integrity
Availability
Password
Keycard
Retina
Fingerprint
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
computer-assisted design.
computer application design.
computer application and design.
computer-aided design.
Mainframe computers
Traditional relational databases
Cloud computing and distributed computing platforms
Personal computers
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
SIM
GPS
Both A andB
None
A type of computer hardware
A digital currency
A distributed ledger technology
An operating system
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
System as a Service
Software as a Solution
Software as a Service
Solution as a System
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Polymorphism
Virtualization
Abstraction
None of the mentioned
Anti virus
Firewall
Cyber safety
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
1 → C, 2 → A, 3 → D, 4 → B
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
Antivirus software
Encryption
Intrusion detection system (IDS)
अनà¥à¤®à¤¾à¤ªà¤•ता
Data security and privacy
Limited storage capacity
Data quality and integrity
Giga byte
Mega byte
Meta byte
Kilo byte
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
Public Cloud
Private Cloud
Hybrid Cloud
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Companies
None of these