Quiz Sagar...
x
OR
We'll never share your email with anyone else.

Facing Issue in Login Click Here

No Result Found

Total

0

Correct

0

InCorrect

0

Score

0%

Cyber laws

What is the punishment for hacking of computer?

  • Three year imprisonment or ten lak rupees penalty or both
  • Life imprisonment
  • Three year imprisonment or five lakh rupees penalty or both
  • Three year imprisonment or two lakh rupees penalty or both
  • option4
  • Clear All
Clear All

Which of the following is called 'Physical component' of computer?

  • Softwere
  • Hardware
  • ALU
  • CPU
  • option2
  • Clear All
Clear All

Which of the following is considered to be the first supercomputer developed in India?

  • SAHASRA T
  • SAGA 220
  • PARAM YUVA 11
  • PARAM 8000
  • option4
  • Clear All
Clear All

What is smallest unit of the 'Digital information'?

  • A bit
  • A byte
  • A block
  • A nibbles
  • option1
  • Clear All
Clear All

Which section of IT Act, 2000 deals with Hacking of computer systems and its penalties?

  • Section -65
  • Section -66
  • Section -62
  • Section -67
  • option2
  • Clear All
Clear All

Which of the following is the full form of 'Malware'?

  • Malfunctioning software
  • Multipurpose software
  • Malicious software
  • Malfunctioning security
  • option3
  • Clear All
Clear All

What is Cyber Security?

  • Cyber security provides security against malware
  • Cyber security provides security against terrorists
  • Cyber security protects a system from cyber attacks
  • All of the above
  • option4
  • Clear All
Clear All

A hard copy is prepared by a which of the following?

  • Printer
  • Joystick
  • Trackball
  • All of the above
  • option1
  • Clear All
Clear All

The term 'EFT' stands for:

  • Emergency fund transfer
  • Electric Fund transfer
  • Electronic fund transfer
  • Electronic fund transmission
  • option3
  • Clear All
Clear All
  • A
  • B
  • C
  • D
  • option3
  • Clear All
Clear All
  • Forge the document
  • Photocopy the document
  • Digital printing
  • Authenticate the document
  • option4
  • Clear All
Clear All

A digital signature is a mathematical technique which validates :

  • Integrity
  • Authenticity
  • Non-repudiation
  • All of the above
  • option2
  • Clear All
Clear All

India's first cyber police station is situated in:

  • Dehli
  • Bangalore
  • Chennai
  • Mumbai
  • option2
  • Clear All
Clear All

Which one of the following is not a type of software?

  • System software
  • Application software
  • Utility software
  • Driver software
  • option3
  • Clear All
Clear All

Twitter Handle @ cyber dost' is developed by:

  • Ministry of Information and Broadcasting
  • Ministry of Home Affairs
  • Ministry of Defence
  • Uttar Pradesh police
  • option2
  • Clear All
Clear All

The main function of computer software is to turn data into:

  • Information
  • Program
  • Object
  • A both B
  • option1
  • Clear All
Clear All

Which one of the following application software is accounting software?

  • Power point
  • Word prefect
  • Tally
  • All of the above
  • option3
  • Clear All
Clear All

Which one of the following refers to the memory in your computer?

  • USB
  • LAN
  • CPU
  • RAM
  • option4
  • Clear All
Clear All

Buying and selling of goods and services on the internet is called:

  • E-Trade
  • E-Commerce
  • E-challan
  • E- training
  • option2
  • Clear All
Clear All

The cyber space has:

  • No national boundaries
  • International jurisdiction
  • Limited boundaries
  • A both B
  • option4
  • Clear All
Clear All

To protect the computer system against the hacker and different kinds of viruses, which one must always be kept on in the computer system:

  • Anti virus
  • Fire well
  • VLC player
  • Non of the above
  • option2
  • Clear All
Clear All

The term I.S.P stands for:

  • International Provider Service
  • Internet Service Provider
  • Internet Service Program
  • Internet Social Policy
  • option2
  • Clear All
Clear All

Ram receives an email claiming that his credit card account is about to be suspended unless he emails his credit card details and Personal Identification Number (PIN) immediately. It is an example of :

  • Spamming
  • Phishing
  • Virus Signing
  • Scanning
  • option2
  • Clear All
Clear All

How many algorithms digital signature consists of?

  • 3
  • 4
  • 5
  • 6
  • option1
  • Clear All
Clear All

What is the full form of GUI?

  • Graphical Universal Interface
  • Graphical User Interface
  • General Utility Interface
  • General Universal Interface
  • option2
  • Clear All
Clear All

Which of the following is not a Cyber Crime?

  • Phishing
  • Cyber Stalking
  • Identity Theft
  • Online chating
  • option4
  • Clear All
Clear All