Standard:9 Computer Chapter:14 Email and Security in Internet

(Question-Answer for English Medium)

1.    What type of information can be send through an Email?
a.    Text and voice
b.    Text and numbers
c.    Multimedia
d.    All of these

2.    What is an alternative name of Junk nails?
a.    Less important mails
b.    Very important fast mails
c.    Unwanted mails
d.    All of these

3.    Which of the followings is needed to send an email besides computers and basic internet facilities?
a.     Email id or Email Address
b.    Permanent Address
c.    Postal Address
d.    All of these

4.    Which of the following is a parasite program that comes along with software that does some harm to the system?
a.    Attack
b.    Virus
c.    Vulnerabilities
d.     All of these

5.    Which of the following is used to transform the original message into unintelligible mesaage by some logic?
a.    Kaison
b.    Cipher
c.    Logic bomb
d.    Atom bomb

6.    Which of the following is an application of various techniques and principles to transform simple message into unintelligent secret message and to transform the message back to its original form?
a.    Cryptography
b.    Cryptanalysis
c.    Cryptology
d.    All of these

7.    Which of the following is known as the process of converting a cipher-text into original plain text?
a.    Enciphering
b.    Encryption
c.    Ciphering
d.    Decryption

8.    Cryptanalysis is also called
a.    Code breaking
b.    Logic breaking
c.    Design breaking
d.    System breaking

9.    What is the collective name of both cryptography and cryptanalysis?
a.    Cryptography
b.    Cryptanalysis
c.    Cryptology
d.    All of these

Manhar Rakholiya

I dont have tell them who am I, They already know me.

12 comments: