Which of the following element make e-waste hazardous in nature?
Question 3
3.
How long is your digital footprint visible for? a. It creates permanent records b. It depends on website you spend most time on c. Your digital footprints wipes clean after one year d. The record never lasts for more than a mo
Question 4
4.
A mail or message sent to a large number of people indiscriminately without their consent is called___________
Question 5
5.
The fraudulent practice of sending emails to individual to induce to know sensitive information like account number and passwords etc.
Question 6
6.
To protect yourself from computer hacker, you should turn on a
Question 7
7.
Which of the following usually observe each activity on the internet of the victim, gather all information in the background, and send it to someone else?
Question 8
8.
Which one of the following statements is correct about Email security in the network security methods?
Question 9
9.
Indian Cyber Law is officially known as
Question 10
10.
The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________
Question 11
11.
__________ comprises posting, sending or sharing negative, nasty or false information about another individual for causing humiliation and character assassination. 1
Question 12
12.
Write down any two measure to prevent phishing
Question 13
13.
Rohan is dumping his electronics and computers spares in the junkyard? What is it called as? How to dispose it off properly?
Question 14
14.
Prithvi has been given a task of writing a poem for a reputed national magazine. He surfs the internet and downloads a poem from another author. He then submits it for the magazine as his work. What sort of crime has he committed? What is risk involved in such activity.?
Question 15
15.
What do you mean by identity theft? Explain with the help of example.
Question 16
16.
What is Online fraud? Give some measures to stop online frauds.