Deck 4: Technology and Cybersecurity

Full screen (f)
exit full mode
Question
Academic website end with

A).ac
B).ca
C).org
D).com
Use Space or
up arrow
down arrow
to flip the card.
Question
Britannica is a

A)free online educational software
B)class room aid
C)edutainment
D)none of these
Question
INFLIBNET is

A)sharing of library and information resources
B)free online education software
C)software for sharing information
D)online bio-resource in centre
Question
An autonomous Inter university Centre of UGC is

A)inflibnet
B)lms
C)arpanet
D)brnet
Question
Google earth is --------

A)entertainment software
B)educational software
C)anti- virus software
D)hardware
Question
----- is free online software for creating flowcharts, floor plans or other similar diagrams.

A)google earth
B)ktouch
C)inflibnet
D)gliffy
Question
Wireless mobile computing is

A)bluetooth
B)wi-fi
C)firewire
D)all of these
Question
The system involves a concealed transmitter in the chassis of an automobile, which may facilitate the vehicle's recovery if stolen.

A)cookies
B)firewire
C)lojack
D)google earth
Question
Which among shows IT for national integration

A)permanent account number (pan)
B)electors photo identity card (epic)
C)sakshat and inflibnet
D)all of these.
Question
In order to be considered "OSI Certified" a product which criteria among the following is not applicable?

A)the author or holder of the license of the source code can collect royalties on the distribution of the program.
B)the author must allow modifications and derivations of the work under the program's original name.
C)no person, group or field of endeavour can be denied access to the program.
D)the rights attached to the program must not depend on the program's being part of a particular software distribution.
Question
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

A)free software programme
B)free software development
C)free software foundation
D)the open source initiative.
Question
Which among is not to help bridge the digital divide:

A)community organisations such as libraries and recreation centres are providing free internet access to the public.
B)increasing the bandwidth of broadband drastically and taking broadband connectivity even to the rural areas, providing computers at cheaper rate,
C)making linux based open source software widely available so that the computing devices cost less and become more affordable.
D)decrease local and global internet and computer access.
Question
Which is the wrong meaning of Digital divide?

A)the discrepancy between the "haves" and "have-notes" with regards to computer technology
B)the gap between people with effective access to digital and information technology and those with very limited or no access at all.
C)exploit the power of the internet for criminal or terrorist purposes.
D)imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen.
Question
Software piracy comes under

A)individual's privacy
B)intellectual property right
C)accountability
D)security of data
Question
Theft of software comes under ......

A)software piracy
B)intellectual property right
C)individual privacy
D)it stress
Question
..... is social networking site

A)orkut
B)facebook
C)myspace
D)all of these
Question
------- can be referred as the use or application of computational devices in the field of biological sciences and research.

A)bio-computing
B)virtual computing
C)artificial intelligent
D)dna
Question
This unlawful acts wherein the computer is either a tool or target or both

A)cyber ethics
B)cyber crime
C)cyber abuse
D)cyber literacy
Question
Which of the following is annoying, but really doesn't render any harm to our computer?

A)shareware
B)malware
C)spyware
D)adware
Question
Why do you not want too much personal data about you on the Internet?

A)it might reveal embarrassing facts about you
B)it might be used by an identity thief to impersonate you
C)it might be used by a potential employer to find out more about you
D)there is no reason to worry about personal information on the internet
Question
What is the top rule for avoiding Internet fraud?

A)if it seems too good to be true, it probably is
B)never use your bank account numbers
C)only work with people who have verifiable e-mail address
D)do not invest in foreign deals
Question
One scam that lures internet users into revealing personal information is

A)malware
B)spam
C)phishing
D)internet hoax
Question
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

A)zero-day attack
B)trojan horse attack
C)distributed denial of service attack
D)boot sector virus attack
Question
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

A)worms
B)stealth viruses
C)logic bombs
D)macro viruses
Question
How could hacker use information about you found through Internet searches?

A)to guess passwords if your passwords are linked to personal
B)to guess passwords if your passwords are linked to your interests or hobbies
C)in social engineering, to ascertain more information about you or your computer system
D)all of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Technology and Cybersecurity
1
Academic website end with

A).ac
B).ca
C).org
D).com
.ac
2
Britannica is a

A)free online educational software
B)class room aid
C)edutainment
D)none of these
free online educational software
3
INFLIBNET is

A)sharing of library and information resources
B)free online education software
C)software for sharing information
D)online bio-resource in centre
sharing of library and information resources
4
An autonomous Inter university Centre of UGC is

A)inflibnet
B)lms
C)arpanet
D)brnet
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Google earth is --------

A)entertainment software
B)educational software
C)anti- virus software
D)hardware
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
----- is free online software for creating flowcharts, floor plans or other similar diagrams.

A)google earth
B)ktouch
C)inflibnet
D)gliffy
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Wireless mobile computing is

A)bluetooth
B)wi-fi
C)firewire
D)all of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
The system involves a concealed transmitter in the chassis of an automobile, which may facilitate the vehicle's recovery if stolen.

A)cookies
B)firewire
C)lojack
D)google earth
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Which among shows IT for national integration

A)permanent account number (pan)
B)electors photo identity card (epic)
C)sakshat and inflibnet
D)all of these.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
In order to be considered "OSI Certified" a product which criteria among the following is not applicable?

A)the author or holder of the license of the source code can collect royalties on the distribution of the program.
B)the author must allow modifications and derivations of the work under the program's original name.
C)no person, group or field of endeavour can be denied access to the program.
D)the rights attached to the program must not depend on the program's being part of a particular software distribution.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
------- is a non-profit corporation formed to educate about and advocate for the benefits of open source and to build bridges among different constituencies in the open source community.

A)free software programme
B)free software development
C)free software foundation
D)the open source initiative.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Which among is not to help bridge the digital divide:

A)community organisations such as libraries and recreation centres are providing free internet access to the public.
B)increasing the bandwidth of broadband drastically and taking broadband connectivity even to the rural areas, providing computers at cheaper rate,
C)making linux based open source software widely available so that the computing devices cost less and become more affordable.
D)decrease local and global internet and computer access.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Which is the wrong meaning of Digital divide?

A)the discrepancy between the "haves" and "have-notes" with regards to computer technology
B)the gap between people with effective access to digital and information technology and those with very limited or no access at all.
C)exploit the power of the internet for criminal or terrorist purposes.
D)imbalances in physical access to technology as well as the imbalances in resources and skills needed to effectively participate as a digital citizen.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Software piracy comes under

A)individual's privacy
B)intellectual property right
C)accountability
D)security of data
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Theft of software comes under ......

A)software piracy
B)intellectual property right
C)individual privacy
D)it stress
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
..... is social networking site

A)orkut
B)facebook
C)myspace
D)all of these
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
------- can be referred as the use or application of computational devices in the field of biological sciences and research.

A)bio-computing
B)virtual computing
C)artificial intelligent
D)dna
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
This unlawful acts wherein the computer is either a tool or target or both

A)cyber ethics
B)cyber crime
C)cyber abuse
D)cyber literacy
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is annoying, but really doesn't render any harm to our computer?

A)shareware
B)malware
C)spyware
D)adware
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Why do you not want too much personal data about you on the Internet?

A)it might reveal embarrassing facts about you
B)it might be used by an identity thief to impersonate you
C)it might be used by a potential employer to find out more about you
D)there is no reason to worry about personal information on the internet
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
What is the top rule for avoiding Internet fraud?

A)if it seems too good to be true, it probably is
B)never use your bank account numbers
C)only work with people who have verifiable e-mail address
D)do not invest in foreign deals
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
One scam that lures internet users into revealing personal information is

A)malware
B)spam
C)phishing
D)internet hoax
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
When hackers use a program that pretends to be useful to a user while actually allowing the hacker to gain control of the user's computer, this is called a(n)

A)zero-day attack
B)trojan horse attack
C)distributed denial of service attack
D)boot sector virus attack
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Virus that travel from computer to computer on their own (i.e. independent of hostile activity) are called

A)worms
B)stealth viruses
C)logic bombs
D)macro viruses
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
How could hacker use information about you found through Internet searches?

A)to guess passwords if your passwords are linked to personal
B)to guess passwords if your passwords are linked to your interests or hobbies
C)in social engineering, to ascertain more information about you or your computer system
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.