Robotics –
Virtual Personal Assistants –
Banks –
Communication –
Business –
Medical Science –
Education –
Media –
Purchase Prediction –
Travel and Ticketing –
Weather Predictions –
Sports –
Q.1 |
Which technology is used by Google to reduce its power consumption in its data centres? |
a) | IoS |
b) | Windows |
c) | Artificial Intelligence |
d) | Android |
Q.2 |
A ……… is someone who seeks and exploits weakness in a computer system. |
a) | Officer |
b) | Hacker |
c) | Cracker |
d) | Tracker |
Q.3 |
There are how many types of a hacker? |
a) |
12 |
b) | 8 |
c) | 10 |
d) | 7 |
Q.4 |
Which type of hacker hacks a system for non malicious reasons? |
a) | White |
b) | Black |
c) | Grey |
d) | Elite |
Q.5 |
Denial of service is a type of ______. |
a) |
Worm |
b) | Virus |
c) | Cyber attack |
d) | None of these |
Q.6 |
The process of hacking a computer system for legal or illegal purpose is called? |
a) | Cracking |
b) | Hacktivism |
c) | Hacking |
d) | Tracking |
Q.7 |
_________ is a program that seems to be doing one thing but is actually doing another. |
a) |
Worm |
b) | Hacking |
c) | Trojan |
d) | Virus |
Q.8 |
_______ is a program that uses low-level, hard-to-detect methods to subvert control of an operating system from its legitimate operators? |
a) |
Root kit |
b) | Hacking |
c) | Trojan |
d) | Virus |
Q.9 |
…..is a tool used to quickly check computers on a network for known weaknesses? |
a) | Packet Analyzer |
b) | Cracker |
c) | Tester |
d) | Vulnerability Scanner |
Q.10 |
…...is an attempt to make a machine or network resource unavailable to its intended users? |
a) | Worm |
b) | Virus |
c) | DOS |
d) | Trojan |
Your Score: 0/10