Page 58 - PortGPT_V2.1_C7_Flipbook
P. 58

test Your skiLLs




                  1.  Tick ( ) the correct option.

                     a. A Digital Footprint is also known as                     .
                       (i)   Digital Diary                              (ii)   Digital Dossier


                       (iii)  Database                                  (iv)  None of the above
                     b.  Why do hackers break into the other’s computer system?

                       (i)   To steal important data                    (ii)   To destroy the system

                       (iii)  Both (i) and (ii)                         (iv)  None of these

                     c.   When the electronic devices are used to harass or embarrass other person then it is called as

                                             .
                       (i)   hacking                                    (ii)   spamming


                       (iii)  cyberbullying                             (iv)  social Networking
                     d.  When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're

                        not to be trusted. It is called                   .

                       (i)  spamming                                    (ii)  e-mail spoofing

                       (iii)  phishing                                  (iv)  None of these
                     e.  Which type of cyber crime is referred to sending of bulk mail by an identified or unidentified
                        source?

                       (i)  Hacking                                     (ii)  Spamming

                       (iii)  Phishing                                  (iv)  None of these

                     f.   Online                     fraud refers to the illegal withdrawing or transferring of money
                        from one bank account to another by a cybercriminal.

                       (i)  IPR                                         (ii)  citation

                       (iii)  transaction                               (iv)  both (i) and (ii)

                     g.  Which of the following statements is incorrect in context of Plagiarism?

                       (i)  We can copy the content written by someone without his permission.

                       (ii)   We can copy the content written by someone by taking his permission.

                       (iii)  We can copy the content written by someone by giving citation.

                       (iv)  We need to rephrase the content after copying.


                  56    Premium Edition-VII
   53   54   55   56   57   58   59   60   61   62   63