|
Page-9 |
|||
Cyber Safety |
|||
| 121)Any criminal activity done over internet or through electronic devices is termed as ________ | |||
| electronic crime | cyber crime | ||
| social media crime | cyber law | ||
| Answer : | |||
| |
|||
| 122)The records or traces of someone's online activity is termed as ___________ | |||
| digital footprint | cyber law | ||
| cyber crime | social media crime | ||
| Answer : | |||
| |
|||
| 123)When someone is harassed over internet, it is called_________ | |||
| phishing | identity thept | ||
| cyber stalking | digital footprint | ||
| Answer : | |||
| |
|||
| 124)A small file on user's computer where visited websites store own information is called__________ | |||
| spam | virus | ||
| cookies | malware | ||
| Answer : | |||
| |
|||
| 125)The fraud that involves using someone else's indenty is termed as _______ | |||
| plagiarism | spamming | ||
| cyber bullying | identity theft | ||
| Answer : | |||
| |
|||
| 126)When something is posted in social media using someone else's ID, it will be termed as _______ | |||
| cyber bullying | identity theft | ||
| phishing | plagiarism | ||
| Answer : | |||
| |
|||
| 127)Which one of the following is correct about social media etiquettes? | |||
| Someone should be reliable | Someone should be authentic | ||
| Someone should be secure | All of these | ||
| Answer : | |||
| |
|||
| |
|||
| 128)Analysis and use of digital data for digital evidence is termed as ___________ | |||
| digital forensics | digital investigation | ||
| digital crime | e-forensics | ||
| Answer : | |||
| |
|||
| 129)Showing appropriate and ethical behaviours in online activities is termed as _________ | |||
| cyber safety | cyber ethics | ||
| cyber law | cyber security | ||
| Answer : | |||
| |
|||
| 130)Spot the odd one from the following. | |||
| X | |||
| gmail | |||
| Answer : | |||
| |
|||
| 131)Which one of the following is not cybercrime? | |||
| Online forgery | Data theft | ||
| Installing anti virus | Installing trojan horse | ||
| Answer : | |||
| |
|||
| 132)What is cybercrime? | |||
| The theft of digital information | Any crime that involves computer and network | ||
| Any crime that uses computer to jeopardise national security | The use of computer network to commit financial fraud | ||
| Answer : | |||
| |
|||
| 133)To avoid tracking and storing cookies, the private browsing open a website in _________ mode. | |||
| duplicate | public | ||
| secured | incognito | ||
| Answer : | |||
| |
|||
| 134)Which one of the following is not a cybercrime? | |||
| Identity theft | Phishing | ||
| Child pornography | Downvoting a social media post | ||
| Answer : | |||
| |
|||
| 135)Which one of the following is not a computer virus? | |||
| Code red | ILOVEYOU | ||
| Kaspersky | MyDoom | ||
| Answer : | |||
| |
|||
