Any crime committed using computers and Internet is termed as ………… -Technology

1 Answer

Answer :

Any crime committed using computers and the Internet is termed ascybercrime.

Related questions

Description : A crime committed by an immigrant in a Sanctuary City, is the city at fault for the crime in any way?

Last Answer : No.

Description : Ethics gut check: Would you help a person who had committed a crime most find reprehensible, or allow them die?

Last Answer : lol

Description : If a crime was committed on an airplane in flight, which country's law would you be charged under?

Last Answer : From what I can tell from this article, it seems that the duty of jurisdiction falls on whichever country the airline was registered with? Then again, I'm quite tired and am ... responsible for what happens aboard their aircraft would definitely provide good incentive for upping their security.

Description : A certain crime is punishable if attempted but not punishable if committed. What is it? -Riddles

Last Answer : Suicide.

Description : The question is whether A committed a crime at Calcutta on a curtain day, fact that  on that day A was at Lahore a) Is relevant b) Is irrelevant c) Is not relevant d) None of these 

Last Answer : a) Is relevant

Description : The question is whether A committed a crime at Calcutta on a curtain day, fact that  on that day A was at Lahore is relevant- a) As a motive for fact in issue b) As introductory to fact in issue c) As preparation of relevant fact d) As it makes existence of fact in issue highly improbable

Last Answer : d) As it makes existence of fact in issue highly improbable

Description : What crime has someone stealing items from a shop committed: shopfitting or shoplifting?

Last Answer : SHOP LIFTING

Description : In the question a part of the sentence is given in BOLD. Alternatives to the BOLD part are given which may improve the construction of the sentence. Select the correct alternative. The man who has committed ... get the most severe (c) have got the most severely (d) have been getting the severe most

Last Answer : (b) get the most severe

Description : In obtaining a warrant, an investigator must convince the judge on all of the following Points except: a. Evidence of a crime is in existence b. A crime has been committed c. The owner or ... likely to have committed The crime d. The evidence is likely to exist at the place to be searched

Last Answer : c. The owner or resident of the place to be searched is likely to have committed The crime

Description : Jhilmalini has stolen a credit card. She used that credit card to purchase a laptop. What type of offence has she committed? -Technology

Last Answer : She has committed a fraud

Description : Communication via New media such as computers, teleshopping, internet and mobile telephony is termed as (A) Entertainment (B) Interactive Communication (C) Development Communication (D) Communitarian

Last Answer : (B) Interactive Communication 

Description : In all computers on the Internet, owned and operated by education institution form part of the (a) .com domain (b) .edu domain -Technology

Last Answer : (b) The domain name edu provides domain registration at no cost to educational institutions.

Description : Name the primary law in India dealing with cyber crime and electronic commerce. -Technology

Last Answer : The primary law is Information Technology Act 2000.

Description : When we connect computers in a network using cables then it is called guided media. -Technology

Last Answer : Three types of cables are used for connecting computers in a network are as follows:1. Twisted Pair Cable It consists of two insulated wires twisted around each other and uses copper as the conducting ... material, which are capable of carrying light signals from a source at one end to another end.

Description : The range of cells containing data that makes a chart is termed as ……………… data. -Technology

Last Answer : The range of cells containing data that makes a chart is termed as Numbers data.

Description : There are five acquaintances. One of them shot and killed one of the other five. Which man is the murderer? 1. Dan ran in the NY City marathon yesterday with one of the innocent men. 2. Mike ... last computers together. 9. The murderer is Jack's brother; they grew up together in Seattle. -Riddles

Last Answer : 1. Jack is not the murderer, because he is the brother of the murderer. 2. Dan can't be the murderer since he ran a marathon, and the murderer recently had his leg amputated, and wouldn't ... must also be alive since Jeff plans to install Ben's computer next week. This means that Jeff killed Mike.

Description : . Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : . Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Computers can be involved in which of the following types of crime? A. Homicide and sexual assault B. Computer intrusions and intellectual property theft C. Civil disputes D. All the above

Last Answer : D. All the above

Description : Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Information is retrieved through Internet using ………….. . -Technology

Last Answer : Information is retrieved through the Internet using search engine.

Description : ……….. helps us to learn anywhere using Internet. -Technology

Last Answer : E-learninghelps us to learn anywhere using the Internet.

Description : For using Wi_Fi, which of the following is not required? (a) An Internet connection -Technology

Last Answer : (d) Bluetooth is not required for Wi-Fi connection.

Description : Priyanka is using her internet connection to book a flight ticket. This is a classic example of leaving a trail of web -Technology

Last Answer : We call this type of activity as Digital FootprintsRisk involved :It includes websites we visit emails we send, and any information we submit onlineetc., along with the computer's IP address, ... details. Such data could be used for targeted advertisement or could also be misused or exploited.

Description : A nut job just committed mass murder here in Canada a few days ago using a rental van, how come there isn't an out cry to ban rental vans?

Last Answer : Vans don’t kill people, people kill people.

Description : Super Computers termed considered as: a) Dumb Terminal b) Intelligent Terminal c) Smart Terminal d) Super Terminal e) None of These

Last Answer : b) Intelligent Terminal

Description : The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ . (1) Access control (2) Congestion (3) Error propagation (4) Deadlock

Last Answer : Congestion

Description : The usefulness of computers has now become a part of humanity. You cannot imagine life without them. (i) Do computers have Weaknesses also. -Technology

Last Answer : (i) Yes, computers have weaknesses. Some weaknesses of computers are lack of decision making power, zero IQ and no heuristics. (ii) Computers are used to listen to songs, send E-mail etc. in daily life

Description : Name the term defined by given below statement: “A group of computers connected to each other by a link.” -Technology

Last Answer : Computer network is defined as a group of computers connected to each other by a link.

Description : Ramya wants to connect all the computers of her office wirelessly in order to avoid clumsy cables. -Technology

Last Answer : Wi-Fi technology would be best suitable for her office to avoid cabling.

Description : Today, computers are.being used very widely for communication. Write down some benefits offered by computers when used for communication. -Technology

Last Answer : File and Data SharingAt a time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, files can be shared ... different locations. It is a type of online game, i.e. played through social networks.

Description : A group of computers connected together with the help of cables within an office building is called (a) PAN (b) WAN -Technology

Last Answer : (d) Using LAN, we can connect computers within a building only.

Description : Network formed between computers which is spread across the continents is called (a) LAN (b) WAN -Technology

Last Answer : (b) Across the continents, computers can be connected using WAN only.

Description : Which of the following uses cables to connect two or more computers? (a) Transmission (b) Unguided -Technology

Last Answer : (c) In guided media, signals are guided through cables.

Description : ……….. is a computer which provides sharing the resources of other computers connected in a network. -Technology

Last Answer : Serveris a computer which provides sharing the resources of other computers connected in a network.

Description : A separate printer will be needed in a network for all connected computers. -Technology

Last Answer : FalseComputers connected to a LAN can share information and through a common printer.

Description : The operating system of computers has progressed from a command_driven system to a Graphical User Interface (GUI). Give the reason behind this. -Technology

Last Answer : A GUI allows more information to be communicated to the user through the icons, pictures etc. Icons can make it easier for a user to know what a computer is going to do after providing a command or instruction.

Description : Real_time operating systems (a) are primarily used on mainframe computers (b) can respond quickly to an event (c) are used for program development -Technology

Last Answer : (b) Real-time operating systems can respond more quickly or predictably to an event than any other OS.

Description : The embedded operating system is used for …………… computers. -Technology

Last Answer : The embedded operating system is used for embedded computers.

Description : Raj at is a commerce student and wants to do his homework but somehow he has lost his calculator and wants to take computer’s help. -Technology

Last Answer : Rajat can use calculator in the system that can do simple as well as sophisticated calculations.To start the calculator:Click Start —> All Programs —> Accessories —> Calculator.

Description : Cracker is a person who breaks security to see what we have stored on our computers with mat intentions. -Technology

Last Answer : True Cracker breaks security with mal intentions.

Description : ABC Company wants to link its computers in the Head office in New Delhi to its office in Sydney. -Technology

Last Answer : ABC Company will formed the World Area Network (WAN) to link its computers in the Head office in New Delhi to its office in Sydney. Unguided or wireless media should be used to form World Area Network.

Description : Crime through Internet includes: a) Telemarketing b) Internet fraud c) Identity Theft d) Credit Card account thefts e) All of the Above f) None of These

Last Answer : e) All of the Above

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : Cybertrails are advantageous because: a. They are not connected to the physical world. b. Nobody can be harmed by crime on the Internet. c. They are easy to follow. d. Offenders who are unaware of them leave behind more clues than they otherwise would have

Last Answer : d. Offenders who are unaware of them leave behind more clues than they otherwise would have

Description : 9. Cybertrails are advantageous because: a. They are not connected to the physical world. b. Nobody can be harmed by crime on the Internet. c. They are easy to follow. d. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : d. Offenders who are unaware of them leave behind more clues than they otherwise would have.