0% found this document useful (0 votes)
27 views6 pages

Ch9 FutureSkill

Ch9 ccc

Uploaded by

ketow43504
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views6 pages

Ch9 FutureSkill

Ch9 ccc

Uploaded by

ketow43504
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Overview of Future-Skills and Cyber Security

(Chapter 9)
Q. 1. What is the full name of WPS?
a) Wifi protected system
b) Wifi protocol setup
c) Wireless protected setup
d) Wifi protected setup ✓

Q. 2. It can deduct your money from your mobile by sending an SMS?


a) SMS Trojans ✓
b) IM Trojans
c) Backdoor Trojans
d) Ransom Trojans

Q. 3. Firewall is used to protect against ……?


a) Data driven attack
b) unauthorized attacks ✓
c) fire attack
d) virus attacks

Q. 4. …....… monitors user activity on the Internet and conducts its information to someone else?
a) Malware
b) Adware
c) Spyware ✓
d) None of these

Q. 5. FSP (Future Skills Portal) was launched by


a) NASSCOM ✓
b) NIELIT
c) WIPRO
d) HCL

Q. 6. What is the full form of DES?


a) Data Evaluation System
b) Data Encryption Software
c) Data Encryption Standard ✓
d) Department of Environmental

Q. 7. Which of the following is not an 'information technology' terminology?


a) upload
b) Cyberspace
c) modem
d) optical storage ✓

Q. 8. Identify computer virus?


a) Trojan horse
b) Malware
c) Ransomware
d) All of above ✓

Q. 9. Is a minor?
a) A type of blockchain
b) an algorithm that predicts the next part of the series
c) the person doing the reckoning to invert the transaction
d) The computer that performs the task of accepting and processing blockchain transactions ✓
Q. 10. What is the password used for?
a) Reliability
b) performance
c) long term
d) Security ✓

Q. 11. RPA stand for…?


a) Robotic Program automation
b) Robotic Process automation ✓
c) Robotic Professional automation
d) Robotic Process automobile

Q. 12. What is Trojan?


a) Computer virus ✓
b) Antivirus
c) Application software
d) High Level Program

Q. 13. What is called to transfer a data from one place to another?


a) Data manipulation
b) Data Communication ✓
c) Data Abstraction
d) None

Q.14 is not related to Internet-of-Things?


a) Capacity ✓
b) Privatization
c) Cyber Security
d) Data storage standard

Q. 15. In which field is the human intelligence of the machine tested?


a) Cognitive science ✓
b) Psychology
c) History
d) Sociology

Q.16. What does 'Block' mean in Blockchain?


a) A hash point
b) A Timestamp
c) Transaction data
d) All of these ✓

Q. 17. What is the full form of CRW?


a) Continuous Wave Radar
b) Continuous Wave Reader ✓
c) Continuous Web Radar
d) None of these

Q. 18. Which of the following defines the MQTT protocol?


a) Request / Responses
b) Mesh Networking
c) Publish / Subscribe ✓
d) Machine to Machine (M2M)
Q. 19. Who makes a virus?
a) machine
b) nature
c) Human ✓
d. All of the above

Q. 20. What is the specialty of Big Data Analytics?


a) Open source
b) Scalability
c) Data recovery
d) All of these ✓

Q. 21. M2M stands for?


a) Money to Money
b) Mobile to Mobile
c) Machine to Machine ✓
d) None of these

Q. 22. The human intelligence of the machine is the area to be tested?


a) Psychology
b) Cognitive science ✓
c) Sociology
d) History

Q. 23. Technology in which the user feels that they are in a virtual environment?
a) VR ✓
b) RA
c) ARX
d) IR

Q. 24. Proxy Server is used?


a) To provide TCP / IP
b) To provide protection against unauthorized users ✓
c) To process client request of web page
d) Request for database access

Q. 25. Where is the hiding place of virus in a computer?


a) Application Program
b) Operating System
c) a and b ✓
d) Disk Driver

Q. 26. Key Loger is ........?


a) spyware ✓
b) firmware
c) Antivirus
d. All of the above

Q. 27. A program or hardware device that filters the information coming from the medium of internet
connection in a network or computer system?
a) Antivirus
b) Firewall ✓
c) Cookies
d) Cyber safety
Q. 28. When did FSP (Future Skills Portal) start?
a) 9th Fab 2018
b) 19th Feb 2018 ✓
c) 29th Feb 2018
d) 19th Nov 2018

Q. 29. A computer virus is?


a) Fungal
b) Bacteria
c) IC 7344
d) software program ✓

Q. 30. VR stand for ...?


a) Virtual Reality ✓
b) Virtual Right
c) Version Reading
d) Versatile Reader

Q. 31. Who is a hacker?


a) there is a human ✓
b) is a machine
c) Internet virus
d) None

Q. 32. You can access information through ……….. cloud computing?


a) Your Desktop
b) Smart Phones
c) Video game Systems
d) All of the above ✓

Q. 33. In which generation AI was used?


a) first generation
b) fourth generation
c) fifth generation ✓
d) None

Q. 34. What is Malware?


a) Software
b) Hackers use it to steal data
c) It damages our computer
d) All of the above ✓

Q. 35. In cloud computing, 'cloud' means?


a) Lock
b) Internet ✓
c) Hard drive
d) Wireless

Q. 36. What is the other way to refer to IOT device?


a) Connected
b) Smart
c) both of the above ✓
d) None
Q. 37. What is the specialty of a computer system capable of thinking, reasoning and learning?
a) Machine Intelligence
b) Virtual Intelligence
c) Artificial intelligence ✓
d) Human Intelligence

Q. 38. Bitcoin is based on .......... blockchain?


a) Private
b) Approval Public
c) Public ✓
d) Acceptance

Q. 39. What is meant by block chain?


a) a ledger distributed over a peer-to-peer network ✓
b) an exchange
c) a type of crypto currency
d) a central laser

Q. 40. Name of the first approved IoT device was ………?


a) ATM
b) Radio ✓
c) Video Game
d) Smart Watch

Q. 41. Which of the following antivirus programs are there?


a) K7
b) Quick Heal
c) Norton
d) All of these ✓

Q. 42. Does AI aim to build systems that exhibit intelligent behavior?


a) True ✓
b) False

Q. 43. Which area is not affected by virtual reality?


a) education
b) surgery
c) Architecture
d) Postal service ✓

Q. 44. Which of the following is true about cloud computing?


a) It is less expensive and safer than local computing from us
b) As long as you have an internet connection, you can access your data from any computer in the world. ✓
c) Only a few small companies are investing, making it risky
d) All of the above

Q. 45. What risks and challenges should be considered in IOT?


a) Privacy & security
b) Energy consumption
c) Network congestion
d) All of the above ✓

Q. 46. Artificial intelligence is related to


a) Making the machine intelligent ✓
b) Put your thinking in computer
c) Programming done wisely
d) playing games
Q. 47. The main function of Firewall is?
a) Deleting
b) Coping
c) Monitoring ✓
d) Moving

Q. 48. Who protects data and password?


a) Encryption ✓
b) Authorization
c) Authentication
d) Non-repudiation

Q. 49. What are the two main sections of cloud computing system?
a) Terminals and nodes
b) Front end and back end ✓
c) Network and Server
d) None

Q. 50. What is cloud computing?


a) It is a complex weather-mapping system that projects climate patterns over long timeframes.
b) A model of computing in which your computer acts as a terminal and a network of servers handles the processing
power and storage for you. ✓
c) It is a fancy name for a local area network (LAN) only.
d) All of the above

You might also like