Cyber laws
What is the punishment for hacking of computer?
- Three year imprisonment or ten lak rupees penalty or both
- Life imprisonment
- Three year imprisonment or five lakh rupees penalty or both
- Three year imprisonment or two lakh rupees penalty or both
- option4 Clear All
Clear All
Which of the following is called 'Physical component' of computer?
- Softwere
- Hardware
- ALU
- CPU
- option2 Clear All
Clear All
Which of the following is considered to be the first supercomputer developed in India?
- SAHASRA T
- SAGA 220
- PARAM YUVA 11
- PARAM 8000
- option4 Clear All
Clear All
What is smallest unit of the 'Digital information'?
- A bit
- A byte
- A block
- A nibbles
- option1 Clear All
Clear All
Which section of IT Act, 2000 deals with Hacking of computer systems and its penalties?
- Section -65
- Section -66
- Section -62
- Section -67
- option2 Clear All
Clear All
Which of the following is the full form of 'Malware'?
- Malfunctioning software
- Multipurpose software
- Malicious software
- Malfunctioning security
- option3 Clear All
Clear All
What is Cyber Security?
- Cyber security provides security against malware
- Cyber security provides security against terrorists
- Cyber security protects a system from cyber attacks
- All of the above
- option4 Clear All
Clear All
A hard copy is prepared by a which of the following?
- Printer
- Joystick
- Trackball
- All of the above
- option1 Clear All
Clear All
The term 'EFT' stands for:
- Emergency fund transfer
- Electric Fund transfer
- Electronic fund transfer
- Electronic fund transmission
- option3 Clear All
Clear All
- A
- B
- C
- D
- option3 Clear All
Clear All
- Forge the document
- Photocopy the document
- Digital printing
- Authenticate the document
- option4 Clear All
Clear All
A digital signature is a mathematical technique which validates :
- Integrity
- Authenticity
- Non-repudiation
- All of the above
- option2 Clear All
Clear All
India's first cyber police station is situated in:
- Dehli
- Bangalore
- Chennai
- Mumbai
- option2 Clear All
Clear All
Which one of the following is not a type of software?
- System software
- Application software
- Utility software
- Driver software
- option3 Clear All
Clear All
Twitter Handle @ cyber dost' is developed by:
- Ministry of Information and Broadcasting
- Ministry of Home Affairs
- Ministry of Defence
- Uttar Pradesh police
- option2 Clear All
Clear All
The main function of computer software is to turn data into:
- Information
- Program
- Object
- A both B
- option1 Clear All
Clear All
Which one of the following application software is accounting software?
- Power point
- Word prefect
- Tally
- All of the above
- option3 Clear All
Clear All
Which one of the following refers to the memory in your computer?
- USB
- LAN
- CPU
- RAM
- option4 Clear All
Clear All
Buying and selling of goods and services on the internet is called:
- E-Trade
- E-Commerce
- E-challan
- E- training
- option2 Clear All
Clear All
The cyber space has:
- No national boundaries
- International jurisdiction
- Limited boundaries
- A both B
- option4 Clear All
Clear All
To protect the computer system against the hacker and different kinds of viruses, which one must always be kept on in the computer system:
- Anti virus
- Fire well
- VLC player
- Non of the above
- option2 Clear All
Clear All
The term I.S.P stands for:
- International Provider Service
- Internet Service Provider
- Internet Service Program
- Internet Social Policy
- option2 Clear All
Clear All
Ram receives an email claiming that his credit card account is about to be suspended unless he emails his credit card details and Personal Identification Number (PIN) immediately. It is an example of :
- Spamming
- Phishing
- Virus Signing
- Scanning
- option2 Clear All
Clear All
How many algorithms digital signature consists of?
- 3
- 4
- 5
- 6
- option1 Clear All
Clear All
What is the full form of GUI?
- Graphical Universal Interface
- Graphical User Interface
- General Utility Interface
- General Universal Interface
- option2 Clear All
Clear All
Which of the following is not a Cyber Crime?
- Phishing
- Cyber Stalking
- Identity Theft
- Online chating
- option4 Clear All
Clear All