Computer crime or Cyber crime is crime that involves:
a) Computer
b) Network
c) Both of Above
d) None of These
✐ 386. Net crim

1 Answer

Answer :

c) Both of Above

Related questions

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : A ______is a harmful computer program that has been hidden inside of something benign, such as an email attachment or even an innocent looking program: a) Trojan Horses b) Worms c) Macro Viruses d) None of These

Last Answer : a) Trojan Horses

Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above

Last Answer : a. Internet Service Provider

Description : Cyber trails are advantageous because: A. They are not connected to the physical world. B. Nobody can be harmed by crime on the Internet. C. They are easy to follow. D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : Most Keyboards use an arrangement of keys given the name: a) Dvork b) ✐ WERTY c) CISC d) None of The Above

Last Answer : WERTY

Description : The background of any Word document - 1) is always white colour 2) is the colour you preset under the Options menu 3) is always the same for the entire document 4) can have any colour you choose

Last Answer : 2) is the colour you preset under the Options menu

Description : The memory location address are limited to--- 1) 00000 to 9ffff(16) 2) 00001 to 9ffff(16) 3) 00010 to 9ffff(16) 4) 10000 to 9ffff(16) Ans: 1) ✐ Which of the follo

Last Answer : 1) 00000 to 9ffff(16)

Description : What is a computer cyber crime?

Last Answer : Cyber crimes are crimes that are perpetrated with the use of a computer. An example might be where someone uses a pc to illegally obtain someone else's personal information and then the "bad ... information to steal money from the victim. Simply, cyber crime is crime committed using a computer.

Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description : What is the name of the new color laptop computer which is powered by a 386 processor at 33 MHz and is built by Epson? A) AX3/33 B) NEC-20 C) Magnum 2000 D) HCL-3000

Last Answer : Answer : A

Description : What is the root meaning for crim?

Last Answer : crim. Latin: fault or crime; accusation. decriminalize.

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : What is Cyber Crime ?

Last Answer : According to the encyclopedia, "cyber crime" refers to the crime that is committed using the Internet . It is related to computers and computer networks.

Last Answer : Cyber crime is a computer related crime.

Description : What are two examples of cyber crime stories?

Last Answer : Need answer

Description :  ___________is well established science where various contribution have been made A. Forensic B. Crime C. Cyber Crime D. Evidence

Last Answer : A. Forensic 

Description : Which was the world’s first microcomputer that used Intel 80386 microprocessor chip? A) IBM PS/2 B) HP-9830 C) DeskPro-386 D) IBM-360

Last Answer : Answer : C

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : What is the name of the new color laptop computer which is powered by a 386 processor at 33 MHz and is built by Epson? a. AX3/33 b. NEC-20 c. Magnum 2000 d. HCL-3000

Last Answer : AX3/33

Description : What is the name of the new color laptop computer which is powered by a 386 processor at 33 MHz and is built by Epson? a. AX3/33 b. NEC-20 c. Magnum 2000 d. HCL-3000

Last Answer : a. AX3/33

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : Which was the first super computer purchased by India for medium range weather forecasting? (1) CrayXMP-14 (2) Medha - 930 (3) CDC Cyber 930-11 (4) Param 

Last Answer : CrayXMP-14

Description : 0. Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : . Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : People who want to legalize all drugs, what do you say to the fact that the majority of violent crime and property crime involves illegal drugs or alcohol?

Last Answer : Isn’t alcohol legal?

Description : What is 6470 divided by 386?

Last Answer : 16.7617

Description : Round to the nearest whole number 386.4?

Last Answer : Round to the nearest whole number 386.4

Description : What is thhe gap on a Autolite 386 plug?

Last Answer : 0.025

Description : What is 64,705 divided by 386?

Last Answer : 167.62953

Description : Which among the following Articles came into force on 26th November 1949, the day the Indian Constitution was adopted? (1) Article 388 (2) Article 390 (3) Article 387 (4) Article 386

Last Answer : (1) Article 388 Explanation: The articles which came into force on 26 November 1949 included articles 5, 6, 8, 9, 60, 324, 366, 372, 388, 391, 392, and 393. Article 388 dealt ... remaining provisions of this Constitution came into force on 26 January, 1950, the day the constitution came in force.

Description : Which article of Indian constitution deals with Constitutional Amendments? (a) Article 332 (b) Article 386 (c) Article 368 (d) None of the above

Last Answer : (c) Article 368

Description : The work done by a charge of 10μC with a potential 4.386 is (in μJ) a) 32.86 b) 43.86 c) 54.68 d) 65.68

Last Answer : b) 43.86

Description : What is the potential difference between 10sinθcosφ/r 2 at A(1,30,20) and B(4,90,60)? a) 2.386 b) 3.386 c) 4.386 d) 5.386

Last Answer : c) 4.386

Description : Pick up the incorrect statement from the following:  (A) The water entering the slow sand filters should be treated by 9.386 coagulants  (B) The depth of water on the filter should be twice the ... is 0.75 times the depth of filter sand, the water obtained is purest  (D) All the above 

Last Answer : (D) All the above 

Description : It is required to maintain a therapeutic concentration of 10 microgram/mL for 12 hours of a drug having half life of 1.386 hr and Vd of 5 L. The dose required in a sustained release product will be (A) 600 mg (B) 300 mg (C) 30 mg (D) 60 mg

Last Answer : (B) 300 mg

Description : Digital forensic applied both ……………. ? a. Analysis and response action b. Computer crime and civil action c. Criminal and civil action d. Regional and forensic action

Last Answer : c. Criminal and civil action

Description : CVE stands for: a) Common Vulnerabilities Exposures b) Cyber Vulnerabilities Exposures c) Cycolic Vulnerabilities Exposures d) None of These

Last Answer : a) Common Vulnerabilities Exposures

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : Governments hired some highly skilled hackers. These types of hackers are termed as _______ a) Special Hackers b) Government Hackers c) Cyber Intelligence Agents d) Nation / State sponsored hackers

Last Answer : d) Nation / State sponsored hackers

Description : . _________ are those individuals who maintain and handles IT security in any firm or organization. a) IT Security Engineer b) Cyber Security Interns c) Software Security Specialist d) Security Auditor

Last Answer : a) IT Security Engineer

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here? a) Gray Hat Hackers b) White Hat Hackers c) Hactivists d) Black Hat Hackers

Last Answer : d) Black Hat Hackers

Description : __________ is the branch of cyber security that deals with morality and provides different theories and a principle regarding the view-points about what is right and wrong. a) Social ethics b) Ethics in cyber-security c) Corporate ethics d) Ethics in black hat hacking

Last Answer : d) Ethics in black hat hacking