• Free Test Series, Mock tests and Practice Tests
  • Time proven exam strategies
  • Exam analysis and simulated tests
  • Hand-on real time test experience

Recently Added Questions

Q:

What is Web Browser?

1.1K 0
  • 1
    Spider
    Correct
    Wrong
  • 2
    A computer that stores files
    Correct
    Wrong
  • 3
    A person who likes to visit websites
    Correct
    Wrong
  • 4
    A software program that allows you to access sites on the World Wide Web
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4
A software program that allows you to access sites on the World Wide Web

  • 1
    Windows
    Correct
    Wrong
  • 2
    Linux
    Correct
    Wrong
  • 3
    Yahoo
    Correct
    Wrong
  • 4
    M.S. Word (MS Word)
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3
Yahoo

Explanation :

The search engine performs the following tasks-

1. Web crawling: Search engines search all web pages on the web using a crawler. A crawler is a program that finds new web pages by following links on the web.

2. Indexing: Once the crawler finds all the web pages, the search engine indexes them in a database. The index contains information for each web page, such as title, URL, and content.

3. Searching: When a user types a search query, the search engine searches all the web pages in the index that may be related to the query.

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1
Hunting

Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

Q:

Is Google Play Store used on mobile?

733 0
  • 1
    To play games
    Correct
    Wrong
  • 2
    To install new applications
    Correct
    Wrong
  • 3
    To search data on mobile
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2
To install new applications

Explanation :

1. It is an international online software store developed by Google for Android devices.

2. Google Play is an online store where people can find their favorite applications, games, movies, TV shows, books, and more.

3. There are 2 million applications and games available for billions of people in the world.

4. So far, developers have earned more than $120 billion from these.

  • 1
    Indian Railways
    Correct
    Wrong
  • 2
    Passport Seva Services
    Correct
    Wrong
  • 3
    ITR filing
    Correct
    Wrong
  • 4
    Aadhaar Updation
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1
Indian Railways

Explanation :

1. Website https://www.irctc.co.in belongs to Indian Railways.

2. IRCTC has revolutionized the lives of the common man traveling by Indian Railways.

3. IRCTC online ticket booking system is a boon for the common man, empowering him through technology.

View more questions

Report Error

Please Enter Message
Error Reported Successfully

Report Error

Please Enter Message
Error Reported Successfully

Report Error

Please Enter Message
Error Reported Successfully

Report Error

Please Enter Message
Error Reported Successfully

Report Error

Please Enter Message
Error Reported Successfully