Go To Top Reset
Information-Technology Related Question Answers
2226. _____ infections have cost more money and taken more time to repair than any other virus type?
(A) File Infector Viruses (B) Multi Partite Viruses (C) Macro Viruses (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2227. _____was virus first appeared on Friday, March 26, 1999 and spread all over the world faster than any virus seen before?
(A) 9 Melissa (B) 10 Melissa (C) 99 Melissa (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2228. 9 Melissa was a _____macro virus?
(A) Microsoft Word (B) Microsoft Excel (C) Internet (D) Microsoft Power Point (E) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2229. A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program?
(A) Trojan Horses (B) Worms (C) Macro Viruses (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2230. Which among the following is correct about the Antivirus Programs?
(A) They contain a database of signatures for all known viruses and worms (B) The software searches a computer for the presence of these signatures (C) Both of Above (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2231. Computer crime or Cyber crime is crime that involves?
(A) Computer (B) Network (C) Both of Above (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2232. Net crime is criminal exploitation of the ___?
(A) Browsers (B) Servers (C) Internet (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2233. Crime through Internet includes?
(A) Telemarketing (B) Internet fraud (C) Identity Theft (D) Credit Card account thefts (E) All of the Above
Disscuss This Question & Answer Add Tags Report Error Show Marks
2234. Which among the following is correct about "Hacking"?
(A) Hacking is an illegal intrusion into a computer system and/or network. (B) Cracking term is equivalent to Hacking (In Indian Laws perspective there is no difference between the term hacking and cracking). (C) Every act committed towards breaking into a computer and/or network is hacking. (D) Hacker can hack or personal monetary gains; such as to stealing the credit card information; transferring money from various bank accounts to their own account followed by withdrawal of money. (E) All of the Above
Disscuss This Question & Answer Add Tags Report Error Show Marks
2235. Which among the following is correct about "Child Pornography"?
(A) Pedophiles lure the children by distributing pornographic material. (B) Pedophiles falsely represent their selves as of same age and win the confidence of children by chatting and by sending images. (C) Pedophiles after wining the confidence of children then offers then monetary as well as physical awards. (D) Pedophiles may sexually exploit the children by using them as sexual objects or by taking their pornographic pictures; in order to sell those over the internet. (E) All of the Above
Disscuss This Question & Answer Add Tags Report Error Show Marks
2236. Which among the following characteristics are correct about 'Cyberstalking'?
(A) Cyberstalking is the use of the internet or electronics to stalk or harass an individual or any group. (B) It includes making harassing phone calls; killing the victims pet; vandalizing victims property; leaving written messages or objects (C) It may be offline as well as online (D) All of the Above (E) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2237. Denial - of - service attack includes?
(A) a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic (B) DoS attacks are included in it. (C) Both a and b (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2238. Which among the following is wrong characteristic of "Phishing"?
(A) Fakers; by offering special rewards or money prize etc asked for personal information such as passwords; credit card information; social security and bank account numbers or other material information. (B) Main purpose is theft or misuse the acquired material (C) Both a and b (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2239. Credit Card Fraud includes?
(A) Credit cards are illegally get and used to get movable or immovable property (B) Unauthorized and illegal use of credit cards (C) Both of Above (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2240. Punishment for Hacking in Inida is?
(A) Imprisonment up to 3 years only (B) Fine (Depend on case to case) only (C) Both of Above (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2241. Which among the following is best suitable for term "Software Piracy"?
(A) Counterfeiting original products (B) Illegal copying of genuine program (C) Both of Above (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2242. Which among the following are Malicious Softwares?
(A) Virus and Worms (B) Trojan Horse and Time Bomb (C) Logic Bomb and Rabbit and Bacterium (D) None of These (E) All of the Above
Disscuss This Question & Answer Add Tags Report Error Show Marks
2243. IRC stands for?
(A) Internet Relay Chat (B) Internal Rely Chat (C) Information Relay Chat (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2244. MOD refers to?
(A) Monitor of Deception (B) Master of Deception (C) Management of Deception (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2245. INTER POL stands for?
(A) International Police (B) Internal Polythims (C) Internet Protocol (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2246. The term Software refers to the set of ________or data a computer processor reads in order to perform a task or operation?
(A) Electronic Program Instructions (B) Planned program instructions (C) assemble and attached program instructions (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2247. Types of Software includes?
(A) Systems Software (B) Application Software (C) Both System and Application Softwares (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2248. Without software, computers would be ____?
(A) Obsolete (B) Inconvenient (C) Useless (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2249. Computer software includes_______and their associated documentation?
(A) Computer Programs (B) Libraries (C) Both of the Above (D) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
2250. In Platform software, Platform includes the?
(A) Firmware (B) Device Drivers (C) Operating System and Graphical User Interface (D) All of the Above (E) None of These
Disscuss This Question & Answer Add Tags Report Error Show Marks
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions © 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions
Question ANSWER With Solution