CCC Chapter 9 Online Test
0 of 20 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
Information
Important for: CCC Online Exam
You have already completed the Test before. Hence you can not start it again.
Test is loading...
You must sign in or sign up to start the Test.
You have to finish following quiz, to start this Test:
Your results are here!! for" Overview of Future skills & Cyber Security - 1 "
0 of 20 questions answered correctly
Your time:
Time has elapsed
Your Final Score is : 0
You have attempted : 0
Number of Correct Questions : 0 and scored 0
Number of Incorrect Questions : 0 and Negative marks 0
Average score |
|
Your score |
|
-
Not categorized
You have attempted: 0
Number of Correct Questions: 0 and scored 0
Number of Incorrect Questions: 0 and Negative marks 0
Pos. | Name | Entered on | Points | Result |
---|---|---|---|---|
Table is loading | ||||
No data available | ||||
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Answered
- Review
-
Question 1 of 20
1. Question
1 pointsडेटा सुरक्षा खतरों में शामिल है ?
Data security threats include? -
Question 2 of 20
2. Question
1 pointsसुरक्षित इलेक्ट्रोनिक लेनदेन प्रोटोकॉल का उपयोग किस प्रकार के भुगतान के लिए किया जाता है What types of payments are used for secure electronic transaction protocols?
-
Question 3 of 20
3. Question
1 pointsकम्प्युटर सुरक्षा के तीन बुनियादी घटक क्या है?
What are the three basic components of computer security? -
Question 4 of 20
4. Question
1 pointsइंटरनेट पर सुरक्षित इलेक्ट्रोनिक डाटा इंटरचेंज ट्रांसमिशन के लिए उपयोग किया जाता है
Used for secure electronic data interchange transmission over the Internet. -
Question 5 of 20
5. Question
1 pointsक्रीपर वायरस को अंतत: ………..नामक एक कार्यक्रम द्वारा हटा दिया गया था ?
The creeper virus was finally removed by a program called -
Question 6 of 20
6. Question
1 pointsआप अपनी क्रिप्टो करेंसी कहाँ स्टोर करते है?
Where do you store your crypto currency? -
Question 7 of 20
7. Question
1 pointsपहली AI प्रोग्रामिंग भाषा है?
The first AI programming language is? -
Question 8 of 20
8. Question
1 pointsसिस्टम ओपरेशन के लिए एक बड़ी सुरक्षा समस्या है ?
Is there a major security problem for system operation? -
Question 9 of 20
9. Question
1 pointsसोफ्टवेयर प्रोग्राम जो एक ऑपरेटिंग सिस्टम में संभावित सुरक्षा कबच के रूप में जाने जाते है ? Software programs that are known to have potential security vulnerabilities in an operating system?
-
Question 10 of 20
10. Question
1 pointsSmart Factory क्या है?
What is Smart Factory? -
Question 11 of 20
11. Question
1 pointsकौन सी सोसल मीडिया इमेज व विडिओ पर आधारित है?
Which social media images and videos are based on? -
Question 12 of 20
12. Question
1 pointsIaaS का फुल नाम है ?
What is the full name of IaaS? -
Question 13 of 20
13. Question
1 pointsInternet of things में शामिल है?
Internet of things included? -
Question 14 of 20
14. Question
1 pointsEDI का पूरा नाम है?
What is the full form of EDI? -
Question 15 of 20
15. Question
1 pointsनिम्नलिखित में से कौन सुरक्षा प्रदान करने की एक विधि नही है?
Which of the following is not a method of providing security? -
Question 16 of 20
16. Question
1 pointsArtificial Intelligence में शामिल है?
Involved in Artificial Intelligence? -
Question 17 of 20
17. Question
1 pointsIoT का पूरा नाम है ?
What is the full name of IoT? -
Question 18 of 20
18. Question
1 pointsसुरक्षित कम्प्यूटिंग का मुख्य लक्ष्य है …………?
The main goal of Secure Computing is -
Question 19 of 20
19. Question
1 pointsकिस सुरक्षा विधि का उपयोग निगरानी के लिए किया जाता है की कौन किस उद्देश्य के लिए डेटा तक पहुच सकता ?
Which security method is used to monitor who can access the data for what purpose? -
Question 20 of 20
20. Question
1 pointsएनक्रिप्शन तकनीक एक नेटवर्क ……….को बेहतरीन बनाती ?
Encryption technology makes a network the best of ………?