Information Technology Tools and Network Basics Theory Question
Overview of Futureskills and Cyber Security
RPA is the use of specialized computer programs known as
FutureSkills
User Interface
Software Robot
Artificial Intelligence
Answer : C
Explain: Robotic process automation (RPA) is a software technology that makes it easy to build, deploy, and manage software robots that emulate humans actions interacting with digital systems and software.
Firewall is type of ?
Virus
threat
Security
Worm
Answer : C
Explain: A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
What is the full form os WPA ?
Wifi Protected Access
Wireless Protected Access
Wired Proctected Access
None of above
Answer : A
Explain: Wi-Fi Protected Access (WPA) is a security standard for computing devices equipped with wireless internet connections.
Which of following monitors user behaviour or access to the internet and sends that information to someone.
Spam
Malware
Spyware
Adware
Answer : C
Explain: Spyware is a malware used to steal the user information on internet and send to someone else without the user known.
What is the Full form of 'IIOT' ?
Intelligence Internet of things
Industrial Internet of things
Internet Inactive of things
Individual Internet of things
Answer : B
Explain: The Industrial Internet of Things (IIoT) is the collection of sensors, instruments and autonomous devices connected through the internet to industrial applications.
Which of the following is not an iot device ?
Arduino
Tablet
Table
Laptop
Answer : C
Explain: Table is just made of wood.
In which of the following years was the blockchain invented ?
2001
2020
2008
2010
Answer : C
Explain: blockchain was created by a person (or group of people) using the name (or pseudonym) Satoshi Nakamoto in 2008 to serve as the public distributed ledger for bitcoin cryptocurrency transactions.
What will be the JAVA extension file used in IoT ?
.c
.py
.exe
.jar
Answer : D
Explain: JAR stands for Java ARchive
Software piece of code that replicates to cause a damage in computer system
Virus
Bacteria
Tram
Spam
Answer : A
Explain: In computer there are some virus which replicates itself automatically.
The common name for the crime of stealing passwords is ?
Spoofing
Identity Theft
Hacking
Crime
Answer : A
Explain: Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system and steal data.
______is a secure cloud based platform for storage, sharing and verification of documents and certificates.
Amazon Web services
Oracle cloud
Google cloud
Digilocker
Answer : D
Explain: DigiLocker allows user to access digital format of documents including drivers licenses, vehicle registration certificates and academic mark sheets and many more documents.
Which is not firewall technique ?
Packet Filter
Application Gateways
Proxy Server
Fire Proxy Service
Answer : D
Explain: Firewalls is like protecting the computer from attackers.
Which of following virus replicates itself in computer ?
Bots
Trojan Horses
Worms
keylogger
Answer : C
Explain: A worm is a computer programme that can self-replicate and damage the system with or without human intervention.
Which of following is not a self replicating type of malware ?
Bots
Trojan Horses
Worms
keylogger
Answer : B
Explain: Trojan horse is a non replication type of malware which can damage hardf disk drive.