Information Technology Tools and Network Basics Theory Question
Overview of Futureskills and Cyber Security - Set 2
OTP is safe because :
It is different for every access
It cannot be shared
It is easy to generate
None of above
Answer : A
Explain: OTP stands for One Time Password.
A type of VR environment in which subjects are visually isolated from the real environment ?
Immersive
Semi immersivee
Non immersive
Augmented
Answer : A
Explain: Immersive (of a computer display or system) is a generating a three-dimensional image which appears to surround the user.
Which of the following is not Big Data Technologies ?
Apache Hadoop
Apache Spark
Apache Kafka
Apache Pytorch
Answer : D
Explain: PyTorch is a machine learning framework based on the Torch library.
Which of following is not a type of cloud computing ?
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
Platform as a Service (PaaS)
Meta as a Service (MaaS)
Answer : D
Explain: Types of Cloud Computing: 1) Infrastructure as a Service (IaaS) 2) Platform as a Service (PaaS) 3) Software as a Service (SaaS).
A utility software to help deliver protection to mobile cyber threats and online scams :
Norton Mobile Security
Norton Mobile Guard
Norton Anti-Virus mobile Safety
None of above
Answer : A
Explain: Norton Mobile Security helps deliver powerful, effective protection for your Android device.
IMEI stands for ?
International mobile equipment identify
Internet mobile equipment identify
International mobile equipment identity
None of above
Answer : C
Explain: The IMEI number or in other words International Mobile Equipment Identity is a unique 15-digit code that precisely identifies the device.
What is code to check IMEI Number ?
*99#
*#06#
*#11#
None of above
Answer : B
Explain: Simply open the caller app on your smartphone, and type in the IMEI number check code: *#06#
How many digits are in IMEI ?
12
16
15
10
Answer : C
Data encryption is used for ?
Security
Performance
Storage
Attack
Answer : A
Explain: encryption is the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
______ is a collection of data that is used in volume, yet growing exponentially with time.
Big Data
Big file
Big information
Big Data file
Answer : A
Explain: Big data is data that contains greater variety, arriving in increasing volumes and with more velocity.