SlideShare a Scribd company logo
1 of 6
Download to read offline
MULTIPLE CHOICE QUESTIONS
Topic -Cyber Privacy
Submitted by -ARYA. S
ROLL NO-24
PHYSICAL SCIENCE
1.when the Indian parliament passed the IT Act
A. 1990
B. 1992
C. 2000
D. 2005
2.what is called protecting data from online attacks,
deletions, malware
A. Physical security
B. Cyber security
C. Cyber attack
D. Virus
3.what is called the unauthorized control /access
over the computer system and destroys data
A. Defamation
B. Carding
C. Hacking
D. Cyber stalking
4.cyber security is also called as…………..security
A. Criminal
B. Information technology
C. National
D. International
5.Which of the following is an antivirus program
A. Wortron
B. K7
C. Quick heal
D. All of these
6…………… monitors users activity on internet and
transmit that information in the background to
someone else
A.Malware
B.Spyware
C.Adware
D. None of these
7.It is a program or hardware device that filters the
information coming through an Internet connection
to a network or computer system
A. Anti-virus
B. Cookies
C. Firewall
D. Cyber security
8.Passwords are used to improve the..........of a
network
A. Performance
B. Reliability
C. Security
D. Longevity
9.Where might a spammer get your personal
information from
A. Facebook
B. MySpace
C. LinkedIn
D. All of the above
10…………… allow a visited website to store its own
information about user on the user’s computer
A.Spam
B.Cookies
C.Malware
D. Adware
11.Which of the following is a class of computers
threat
A. Phishing
B. Soliciting
C. DoS attack
D. Stalking
12.Unsolicited commercial email is known as……
A. Spam
B. Malware
C. Virus
D. Spyware
ANSWERS
1-D
2-B
3-C
4-B
5-D
6-B
7-C
8-C
9-D
10-B
11-C
12-A

More Related Content

What's hot

Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksLearningwithRayYT
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Web security
Web securityWeb security
Web security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Application security
Application securityApplication security
Application security
 
Application Attacks & Application Layer Attacks
Application Attacks & Application Layer AttacksApplication Attacks & Application Layer Attacks
Application Attacks & Application Layer Attacks
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Similar to Mcq arya. s 24 cyber privacy

4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptxHHoko1
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxssuser2209e8
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comVirendra Kumar Dubey
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdf1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdfamitagar30
 
1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdf1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdfabhijitakolkar1
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture ACMDLearning
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfJohnRicos
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
CMIT 321 FINAL EXAM
CMIT 321 FINAL EXAMCMIT 321 FINAL EXAM
CMIT 321 FINAL EXAMHamesKellor
 
1 introit security
1 introit security1 introit security
1 introit securityricharddxd
 
Electronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment TechnologyElectronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment Technology1107Shaineth
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And PrivacyTodd Turner
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 

Similar to Mcq arya. s 24 cyber privacy (20)

Unit I Q&A.docx
Unit I Q&A.docxUnit I Q&A.docx
Unit I Q&A.docx
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdf1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdf
 
1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdf1 Being an informed user allows you to A do everything in.pdf
1 Being an informed user allows you to A do everything in.pdf
 
Security & Privacy - Lecture A
Security & Privacy - Lecture ASecurity & Privacy - Lecture A
Security & Privacy - Lecture A
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
CMIT 321 FINAL EXAM
CMIT 321 FINAL EXAMCMIT 321 FINAL EXAM
CMIT 321 FINAL EXAM
 
1 introit security
1 introit security1 introit security
1 introit security
 
Com Ed 8 Finals
Com Ed 8 FinalsCom Ed 8 Finals
Com Ed 8 Finals
 
Electronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment TechnologyElectronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment Technology
 
A Review On Network Security And Privacy
A Review On Network Security And PrivacyA Review On Network Security And Privacy
A Review On Network Security And Privacy
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 

More from ARYAS87

SOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdfSOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdfARYAS87
 
DOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdfDOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdfARYAS87
 
Nutrition chart
Nutrition chart Nutrition chart
Nutrition chart ARYAS87
 
Health chart
Health chart Health chart
Health chart ARYAS87
 
digitaltext me.pdf
digitaltext  me.pdfdigitaltext  me.pdf
digitaltext me.pdfARYAS87
 
Mcq arya. s 24 froebel
Mcq arya. s 24 froebelMcq arya. s 24 froebel
Mcq arya. s 24 froebelARYAS87
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy ARYAS87
 
Edu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) FroebelEdu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) FroebelARYAS87
 
Thullal
Thullal Thullal
Thullal ARYAS87
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sARYAS87
 
Edu 1 contributions of froebel arya. s 24
Edu 1 contributions of  froebel arya. s 24Edu 1 contributions of  froebel arya. s 24
Edu 1 contributions of froebel arya. s 24ARYAS87
 
Albert einstein 2
Albert einstein 2Albert einstein 2
Albert einstein 2ARYAS87
 

More from ARYAS87 (12)

SOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdfSOLUTIONS-WPS Office(1).pdf
SOLUTIONS-WPS Office(1).pdf
 
DOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdfDOC-20230109-WA0004..pdf
DOC-20230109-WA0004..pdf
 
Nutrition chart
Nutrition chart Nutrition chart
Nutrition chart
 
Health chart
Health chart Health chart
Health chart
 
digitaltext me.pdf
digitaltext  me.pdfdigitaltext  me.pdf
digitaltext me.pdf
 
Mcq arya. s 24 froebel
Mcq arya. s 24 froebelMcq arya. s 24 froebel
Mcq arya. s 24 froebel
 
Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy Edu 3 arya. s 24 Cyber privacy
Edu 3 arya. s 24 Cyber privacy
 
Edu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) FroebelEdu 01 arya. s 24 (1) Froebel
Edu 01 arya. s 24 (1) Froebel
 
Thullal
Thullal Thullal
Thullal
 
Edu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. sEdu -3 Cyber privacy arya. s
Edu -3 Cyber privacy arya. s
 
Edu 1 contributions of froebel arya. s 24
Edu 1 contributions of  froebel arya. s 24Edu 1 contributions of  froebel arya. s 24
Edu 1 contributions of froebel arya. s 24
 
Albert einstein 2
Albert einstein 2Albert einstein 2
Albert einstein 2
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Recently uploaded (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Mcq arya. s 24 cyber privacy

  • 1. MULTIPLE CHOICE QUESTIONS Topic -Cyber Privacy Submitted by -ARYA. S ROLL NO-24 PHYSICAL SCIENCE
  • 2. 1.when the Indian parliament passed the IT Act A. 1990 B. 1992 C. 2000 D. 2005 2.what is called protecting data from online attacks, deletions, malware A. Physical security B. Cyber security C. Cyber attack D. Virus 3.what is called the unauthorized control /access over the computer system and destroys data A. Defamation B. Carding C. Hacking D. Cyber stalking
  • 3. 4.cyber security is also called as…………..security A. Criminal B. Information technology C. National D. International 5.Which of the following is an antivirus program A. Wortron B. K7 C. Quick heal D. All of these 6…………… monitors users activity on internet and transmit that information in the background to someone else A.Malware B.Spyware C.Adware D. None of these
  • 4. 7.It is a program or hardware device that filters the information coming through an Internet connection to a network or computer system A. Anti-virus B. Cookies C. Firewall D. Cyber security 8.Passwords are used to improve the..........of a network A. Performance B. Reliability C. Security D. Longevity 9.Where might a spammer get your personal information from A. Facebook B. MySpace C. LinkedIn
  • 5. D. All of the above 10…………… allow a visited website to store its own information about user on the user’s computer A.Spam B.Cookies C.Malware D. Adware 11.Which of the following is a class of computers threat A. Phishing B. Soliciting C. DoS attack D. Stalking 12.Unsolicited commercial email is known as…… A. Spam B. Malware C. Virus D. Spyware