Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M1 R5: Information Technology Tools and Network Basics
Networking Fundamentals
Set 14
25
See Explanation !
1
What are types of malware?
मैलवेयर के प्रकार क्या हैं?
Viruses
Spyware
Worms
All of these
Next Question
25
See Explanation !
2
What could be a good indicator of a Spam email?
स्पैम ईमेल का एक अच्छा संकेतक क्या हो सकता है?
Something that sounds too good to be true
An email that contains plenty of grammar mistakes
An email sent to a bunch of random people
All of These
Previous Question
Next Question
25
See Explanation !
3
Which of these is an example of a possible victim in a phishing attack?
इनमें से कौन सा एक फ़िशिंग हमले में संभावित शिकार का उदाहरण है?
The website that was hacked
The person who had their identity stolen
The bank of the victim
All of These
Previous Question
Next Question
25
See Explanation !
4
—— refers to electronic trespassing or criminal hacking.
—— इलेक्ट्रॉनिक अतिक्रमण या आपराधिक हैकिंग को संदर्भित करता है।
Cracking
Jacking
Spoofing
Smarming
Previous Question
Next Question
25
See Explanation !
5
An unauthorized user is a network _______ issue.
एक अनधिकृत उपयोगकर्ता एक नेटवर्क _______ समस्या है।
Performance
Reliability
Security
All the above
Previous Question
Next Question
25
See Explanation !
6
In computer security,…………… means that the information in a computer system only be accessible viewing by authorized parities.
कंप्यूटर सुरक्षा में,……………… का अर्थ है कि कंप्यूटर सिस्टम में जानकारी केवल अधिकृत समता द्वारा देखी जा सकती है।
Availability
Integrity
Confidentiality
All of the above
Previous Question
Next Question
25
See Explanation !
7
Encryption techniques improve a networks
एन्क्रिप्शन तकनीक एक नेटवर्क में सुधार करती है
Performance
Security
Reliability
None of above
Previous Question
Next Question
25
See Explanation !
8
Which protection method is used to monitoring who can access the data for what purpose?
किस उद्देश्य के लिए डेटा तक कौन पहुंच सकता है, इसकी निगरानी के लिए किस सुरक्षा विधि का उपयोग किया जाता है?
System access control
System design
Data access control
None of above
Previous Question
Next Question
25
See Explanation !
9
The main goals of secure computing is
सुरक्षित कंप्यूटिंग के मुख्य लक्ष्य हैं
Confidentiality
Interruption
Modification
All of Above
Previous Question
Next Question
25
See Explanation !
10
Which of the following is not a method to provide protection
निम्नलिखित में से कौन सुरक्षा प्रदान करने का एक तरीका नहीं है
System design
Data access control
System access controls
None of above
Previous Question
Next Question
25
See Explanation !
11
In computer security, integrity refer to
कंप्यूटर सुरक्षा में, अखंडता को संदर्भित करता है
Viewing and printing of data
Access to computing resources without difficulties
Separation and protection of the resources data
All of the above
Previous Question
Next Question
25
See Explanation !
12
Authentication is
प्रमाणीकरण है
Hard to assure identity of user on a remote system
Insertion
Modification
All of the above
Previous Question
Next Question
25
See Explanation !
13
Software programs that close potential security breaches in an operating system are known as
सॉफ्टवेयर प्रोग्राम जो एक ऑपरेटिंग सिस्टम में संभावित सुरक्षा उल्लंघनों को बंद करते हैं, उन्हें............ के रूप में जाना जाता है
Security patches
Refresh patches
Security breath fixes
All of the above
Previous Question
Next Question
25
See Explanation !
14
A major security problem for operation system is
ऑपरेशन सिस्टम के लिए एक बड़ी सुरक्षा समस्या है
Physical problem
Human problem
Authentication problem
All of the above
Previous Question
Next Question
25
See Explanation !
15
Malware is used to
मैलवेयर का उपयोग किया जाता है
Disrupt computer operation
Gather sensitive information
Both A and B
All of the Above
Previous Question
Next Question
25
See Explanation !
16
The aspect of security that fails, when an email in intercepted is
सुरक्षा का वह पहलू जो विफल हो जाता है, जब किसी ईमेल को इंटरसेप्ट किया जाता है
Integrity
Privacy
Authentication
All of these
Previous Question
Next Question
25
See Explanation !
17
The creeper virus was eventually deleted by a program known as
लता वायरस को अंततः एक प्रोग्राम द्वारा हटा दिया गया जिसे
The weaper
The reaper
The seaper
None of the above
Previous Question
Next Question
25
See Explanation !
18
What are the three basic component of computer security?
कंप्यूटर सुरक्षा के तीन मूल घटक क्या हैं?
Confidentiality, integrity, availability
Control, intelligence, action
Central, intelligence, agency
Confidence, integrity, action
Previous Question
Next Question
25
See Explanation !
19
Data security threats include
डेटा सुरक्षा खतरों में शामिल हैं
Hardware Failure
Privacy Invasion
Fraudulent Manipulation of Data
All of the Above
Previous Question
Next Question
25
See Explanation !
20
Which of the following is/are threat(s) for electronic payment system?
इलेक्ट्रॉनिक भुगतान प्रणाली के लिए निम्नलिखित में से कौन सा खतरा है/हैं?
Computer virus
Trojan horse
Computer worms
All of the above
Previous Question
Next Question
25
See Explanation !
21
Firewall is a type of
फ़ायरवॉल एक प्रकार का फ़ायरवॉल है
Hardware
Software
Both Hardware and Software
None of These
Previous Question
Next Question
25
See Explanation !
22
Unauthorized access is which type of threats
अनधिकृत पहुंच यह है कि किस प्रकार के खतरे हैं
Security
Reliability
Performance
None of these
Previous Question
Next Question
25
See Explanation !
23
which are included in internet of things
जो इंटरनेट ऑफ थिंग्स में शामिल हैं
Software
Sensors, Actuator
WIFI Technique
All of the Above
Previous Question
Next Question
25
See Explanation !
24
This is not a benefit of Big Data analytics
यह बिग डेटा एनालिटिक्स का लाभ नहीं है
Faster, better decision making
Cost Reduction
Manage of Data
None of the above
Previous Question
Next Question
25
See Explanation !
25
Included in Artificial intelligence
आर्टिफ़िशियल इंटेलिजेंस में शामिल है
Knowledge
Planning
Both a & b
None of These
Previous Question