ExamLookup
Menu mobile
Home
Current Affairs
General Knowledge
Computer
Python
HTML
- OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY QUIZ | MCQ Questions
- OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY QUIZ | MCQ Questions
00:00:00
English
Hindi
Question No# :
01
out of 50
Which Of The Following Is A Blogging Platform?
Which Of The Following Is A Blogging Platform?
A.
Google
Google
B.
Facebook
Facebook
C.
Wordpress
Wordpress
D.
Chrome
Chrome
Question No# :
02
out of 50
A major security problem for operation system is
A major security problem for operation system is
A.
Physical problem
Physical problem
B.
Human problem
Human problem
C.
Authentication problem
Authentication problem
D.
All of the above
All of the above
Question No# :
03
out of 50
A type of VR environment in which subjects are visually isolated from the real environment.
A type of VR environment in which subjects are visually isolated from the real environment.
A.
Immersive
Immersive
B.
Semi immersivee
Semi immersivee
C.
Non immersive
Non immersive
D.
Augmented
Augmented
Question No# :
04
out of 50
Which of the following is the collective name for Trojan horses, spyware, and worms?
Which of the following is the collective name for Trojan horses, spyware, and worms?
A.
Spware
Spware
B.
Botnets
Botnets
C.
Virus
Virus
D.
Malware
Malware
Question No# :
05
out of 50
Which of the following are forms of malicious attack
Which of the following are forms of malicious attack
A.
Theft of information
Theft of information
B.
Modification of data
Modification of data
C.
Wiping of information
Wiping of information
D.
All of the mentioned
All of the mentioned
Question No# :
06
out of 50
What is the full form of EPFO
What is the full form of EPFO
A.
Employees' Private Fund Organisation
Employees' Private Fund Organisation
B.
Electronic' Provident Fund Organisation
Electronic' Provident Fund Organisation
C.
Employees' Provident Fund Organisation
Employees' Provident Fund Organisation
D.
Electronic' Provident Fund Office
Electronic' Provident Fund Office
Question No# :
07
out of 50
Cipher text is the meaningful form of encrypted message that can be read in transit by anyone.
Cipher text is the meaningful form of encrypted message that can be read in transit by anyone.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
08
out of 50
In which generation AI was used?
In which generation AI was used?
A.
First generation
प्रथम पीढ़ी
B.
Fourth generation
चतुर्थ पीढ़ी
C.
Fifth generation
पंचम पीढ़ी
D.
None of these
इनमें से कोई नहीं
Question No# :
09
out of 50
Which of the standardized encoding mode is not using by QR code?
Which of the standardized encoding mode is not using by QR code?
A.
Special Symbols
Special Symbols
B.
Binary
Binary
C.
Alphanumeric
Alphanumeric
D.
Numeric
Numeric
Question No# :
10
out of 50
Which of the following is not an external threat to a computer or a computer network
Which of the following is not an external threat to a computer or a computer network
A.
Ignorance
Ignorance
B.
Trojan horses
Trojan horses
C.
Adware
Adware
D.
Crackers
Crackers
Question No# :
11
out of 50
What is full form of IRCTC?
What is full form of IRCTC?
A.
Indian Railway Catering and Tourism Corporation
Indian Railway Catering and Tourism Corporation
B.
Indian Railway Catering and Tourism Company
Indian Railway Catering and Tourism Company
C.
Indian Railway Tourism Corporation
Indian Railway Tourism Corporation
D.
Indian Railway Central Tourism Corporation
Indian Railway Central Tourism Corporation
Question No# :
12
out of 50
What is the name of India's first social media app named launched by Vice President Venkiah Naidu?
What is the name of India's first social media app named launched by Vice President Venkiah Naidu?
A.
Elyments
Elyments
B.
Milap
Milap
C.
Chatmat
Chatmat
D.
Connect
Connect
Question No# :
13
out of 50
Who will introducing 'Learning Playlists' for educational videos?
Who will introducing 'Learning Playlists' for educational videos?
A.
Facebook
Facebook
B.
YouTube
YouTube
C.
Skype
Skype
D.
Twitter
Twitter
Question No# :
14
out of 50
Firewall is a type of ____________.
Firewall is a type of ____________.
A.
Virus
Virus
B.
Security threat
Security threat
C.
Worm
Worm
D.
None of the above
इनमे से कोई भी नहीं
Question No# :
15
out of 50
Where is the QR code is used?
Where is the QR code is used?
A.
In payment transfer
पेमेंट ट्रांसफर में
B.
In account verification
अकाउंट वेरीफिकेशन में
C.
In both
दोनों में
D.
neither of the above
उपरोक्त में से कोई नहीं
Question No# :
16
out of 50
When is encrypted data the safest?
When is encrypted data the safest?
A.
When it is being transferred via usb stick.
जब इसे usb स्टिक के माध्यम से स्थानांतरित किया जा रहा है
B.
When it is in transit.
जब यह पारगमन में है
C.
When it is being written. When it is at rest.
जब यह लिखा जा रहा है। जब यह आराम पर हो
D.
When it is being written.
जब यह लिखा जा रहा है
Question No# :
17
out of 50
What are the common security threats
What are the common security threats
A.
File Shredding
File Shredding
B.
File sharing and permission
File sharing and permission
C.
File corrupting
File corrupting
D.
File integrity
File integrity
Question No# :
18
out of 50
What code do IMEI numbers used?
What code do IMEI numbers used?
A.
*60#
*60#
B.
$#6#
$#6#
C.
*#06#
*#06#
D.
None
कोई नहीं
Question No# :
19
out of 50
FSSAI to develop app to prevent food wastage in partnership with whichcompany?
FSSAI to develop app to prevent food wastage in partnership with whichcompany?
A.
Google
Google
B.
Nasscom Foundation
Nasscom Foundation
C.
Infosys
Infosys
D.
TCS
TCS
Question No# :
20
out of 50
Unauthorized access and viruses are issues dealing with network
Unauthorized access and viruses are issues dealing with network
A.
Performance
प्रदर्शन
B.
Reliability
विश्वसनीयता
C.
Security
सुरक्षा
D.
None of the above
इनमे से कोई भी नहीं
Question No# :
21
out of 50
A company requires its users to change passwords every month. This improves the _______ of the network
A company requires its users to change passwords every month. This improves the _______ of the network
A.
Performance
प्रदर्शन
B.
Reliability
विश्वसनीयता
C.
Security
सुरक्षा
D.
None of the above
इनमे से कोई भी नहीं
Question No# :
22
out of 50
Which of the following is an anti-virus program
Which of the following is an anti-virus program
A.
Norton
Norton
B.
K7
K7
C.
Quick heal
Quick heal
D.
All of these
ये सभी
Question No# :
23
out of 50
Full form of IMEI?
Full form of IMEI?
A.
International mobile equipment identify
International mobile equipment identify
B.
Internet mobile equipment identify
Internet mobile equipment identify
C.
International mobile equipment identity
International mobile equipment identity
D.
None
कोई नहीं
Question No# :
24
out of 50
Public key system is useful because
Public key system is useful because
A.
It uses Two Keys
यह दो कुंजी का उपयोग करता है
B.
there is no key distribution problem as public key can be kept in a commonly accessible database.
कोई महत्वपूर्ण वितरण समस्या नहीं है क्योंकि सार्वजनिक कुंजी को आमतौर पर सुलभ डेटाबेस में रखा जा सकता है
C.
Private Key can be Kept Secret
निजी कुंजी को गुप्त रखा जा सकता है
D.
It is a Symmetric Key System.
यह एक सममित कुंजी प्रणाली है
Question No# :
25
out of 50
What was Tim Berners-Lee's occupation?
What was Tim Berners-Lee's occupation?
A.
Mathematician
Mathematician
B.
Software Engineer
Software Engineer
C.
Teacher
Teacher
D.
None of these
इनमें से कोई नहीं
Question No# :
26
out of 50
The certificate Authority signs the digital certificate with
The certificate Authority signs the digital certificate with
A.
Users public key
उपयोगकर्ता सार्वजनिक कुंजी
B.
Users Private Key
उपयोगकर्ता निजी कुंजी
C.
Its own public key
इसकी अपनी सार्वजनिक कुंजी
D.
Its own Private key
इसकी अपनी निजी कुंजी
Question No# :
27
out of 50
Which institute has developed a virtual classroom aid, 'Mobile Masterjee'?
Which institute has developed a virtual classroom aid, 'Mobile Masterjee'?
A.
The Indian Institute of Technology, Kanpur
The Indian Institute of Technology, Kanpur
B.
The Indian Institute of Technology, Bhubaneswar
The Indian Institute of Technology, Bhubaneswar
C.
The Indian Institute of Technology, Mandi
The Indian Institute of Technology, Mandi
D.
The Indian Institute of Science
The Indian Institute of Science
Question No# :
28
out of 50
Which of the following option is not best described about industry 4.0
Which of the following option is not best described about industry 4.0
A.
Smart factory
Smart factory
B.
Speed
Speed
C.
Analytics
Analytics
D.
None of above
इनमें से कोई भी नहीं
Question No# :
29
out of 50
Flash memory is nonvolatile and often used in digital camera and cell phones
Flash memory is nonvolatile and often used in digital camera and cell phones
A.
TRUE
B.
FALSE
Question No# :
30
out of 50
Shortcut Key to Auto Filter in LibreOffice Calc is
Shortcut Key to Auto Filter in LibreOffice Calc is
A.
CTRL+Shift+L
CTRL+Shift+L
B.
CTRL+Shift+A
CTRL+Shift+A
C.
CTRL+Shift+F
CTRL+Shift+F
D.
CTRL+Shift+K
CTRL+Shift+K
Question No# :
31
out of 50
The full name of NASSCOM is National Association of Software and Service Companies?
The full name of NASSCOM is National Association of Software and Service Companies?
A.
TRUE
B.
FALSE
Question No# :
32
out of 50
Which of the following is not a method to provide protection
Which of the following is not a method to provide protection
A.
System design
System design
B.
Data access control
Data access control
C.
System access controls
System access controls
D.
None of above
None of above
Question No# :
33
out of 50
What are types of malware?
What are types of malware?
A.
Viruses
Viruses
B.
Spyware
Spyware
C.
Worms
Worms
D.
All of these
ये सभी
Question No# :
34
out of 50
By symmetric key encryption we mean
By symmetric key encryption we mean
A.
one private key is used for both encryption and decryption
एन्क्रिप्शन और डिक्रिप्शन दोनों के लिए एक निजी कुंजी का उपयोग किया जाता है
B.
private and public key used are symmetric
निजी और सार्वजनिक कुंजी का उपयोग सममित हैं
C.
only public keys are used for encryption
एन्क्रिप्शन के लिए केवल सार्वजनिक कुंजी का उपयोग किया जाता है
D.
only symmetric key is used for encryption
एन्क्रिप्शन के लिए केवल सममित कुंजी का उपयोग किया जाता है
Question No# :
35
out of 50
Which day is celebrated as world Computer Literacy Day?
Which day is celebrated as world Computer Literacy Day?
A.
December 2
December 2
B.
November 2
November 2
C.
December 12
December 12
D.
November 12
November 12
Question No# :
36
out of 50
Name the program that contains hidden malicious functions but look like something funny or useful such as a game or utility, but harms the system when executed.
Name the program that contains hidden malicious functions but look like something funny or useful such as a game or utility, but harms the system when executed.
A.
Trojans
ट्रोजन्स
B.
Virus
वाइरस
C.
Spyware
स्पाइवेयर
D.
All of these
ये सभी
Question No# :
37
out of 50
Which of the following has partnered will UNESCO to adopt technology in classrooms?
Which of the following has partnered will UNESCO to adopt technology in classrooms?
A.
Samsung
Samsung
B.
Lenovo
Lenovo
C.
Toshiba
Toshiba
D.
DELL
DELL
Question No# :
38
out of 50
Which of the following cannot be done with VoIP?
Which of the following cannot be done with VoIP?
A.
Voicemail
Voicemail
B.
Call forwarding
Call forwarding
C.
Call waiting
Call waiting
D.
Instant messaging
Instant messaging
Question No# :
39
out of 50
Mixed Reality Experience Combines Elements From Virtual Reality And Augmented Reality?
Mixed Reality Experience Combines Elements From Virtual Reality And Augmented Reality?
A.
TRUE
B.
FALSE
Question No# :
40
out of 50
Name the web mapping service, which launches three new public transport features in India.
Name the web mapping service, which launches three new public transport features in India.
A.
WikiMapia
WikiMapia
B.
MapQuest
MapQuest
C.
Bing Maps
Bing Maps
D.
Google Maps
Google Maps
Question No# :
41
out of 50
What is the term used to refer to sending unwanted bulk messages, especially advertising, indiscriminately?
What is the term used to refer to sending unwanted bulk messages, especially advertising, indiscriminately?
A.
Phising
Phising
B.
Spamming
Spamming
C.
Virus
Virus
D.
Malware
Malware
Question No# :
42
out of 50
Ripping is the process of copying data from CD to Hard disk.
Ripping is the process of copying data from CD to Hard disk.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
43
out of 50
Which of the following software could be used to build a website?
Which of the following software could be used to build a website?
A.
PowerPoints
PowerPoints
B.
Excel
Excel
C.
ERP
ERP
D.
Dreamweaver
Dreamweaver
Question No# :
44
out of 50
Data encryption is used for
Data encryption is used for
A.
Security
Security
B.
Performance
Performance
C.
Storage
Storage
D.
All of above
ऊपर के सभी
Question No# :
45
out of 50
Name of the programme that is jointly launched by Google India & Tata Trusts to facilitate digital literacy among women in rural India.
Name of the programme that is jointly launched by Google India & Tata Trusts to facilitate digital literacy among women in rural India.
A.
Internet Saathi
Internet Saathi
B.
New India
New India
C.
Women Power
Women Power
D.
Techie Women
Techie Women
Question No# :
46
out of 50
A _______ is illicitly introduced code that damages a network device
A _______ is illicitly introduced code that damages a network device
A.
Protocol
Protocol
B.
Virus
Virus
C.
Catastrophe
Catastrophe
D.
Medium
Medium
Question No# :
47
out of 50
What is the full form of EDS?
What is the full form of EDS?
A.
Electronic Data System
इलेक्ट्रॉनिक डाटा सिस्टम
B.
Electronic Data Software
इलेक्ट्रॉनिक डाटा सॉफ्टवेयर
C.
Electric Data System
इलेक्ट्रिक डाटा सिस्टम
D.
Electric Digit System
इलेक्ट्रिक डिजिट सिस्टम
Question No# :
48
out of 50
Spware monitors user activity on internet and transmit that information in the background to someone else
Spware monitors user activity on internet and transmit that information in the background to someone else
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
49
out of 50
Full form of MMID?
Full form of MMID?
A.
Mobile Money Identifier
मोबाइल मनी आइडेंटिफायर
B.
Mobile making identifier
मोबाइल मेकिंग आइडेंटिफायर
C.
Money mobile identifier
मनी मोबाइल आइडेंटिफायर
D.
Mobile money immediate
मोबाइल मनी इम्मेडिएट
Question No# :
50
out of 50
Which of the following in not a type of POS
Which of the following in not a type of POS
A.
Restaurant POS
Restaurant POS
B.
ATM POS
ATM POS
C.
Tablet-based POS
Tablet-based POS
D.
Reception Desk POS
Reception Desk POS
CCC Online Test 2021
CCC Practice Test Hindi
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
O Level NIELIT Study material and Quiz
Bank SSC Railway TET UPTET Question Bank
career counselling in allahabad
Sarkari Exam Quiz
Website development Company in Allahabad