غیر مجاز رسائی کو روکنے کے لیے ڈیٹا کو کوڈ میں تبدیل کرنے کے عمل کی اصطلاح کیا ہے؟
A. Compression
B. Encryption
C. None of these
D. Decryption
Explanation
Encryption is the process of converting plaintext data into a coded, unreadable form to protect it from unauthorized access.
The primary purpose of encryption is to ensure the confidentiality and security of sensitive information.
Show/Hide Explanation
A. Of
B. To
C. None of these
D. In
Explanation
The correct phrase is " access to " something (meaning the ability to reach or use).
So, " no access to the relevant data " is the proper expression.
Show/Hide Explanation
سائبر سیکیورٹی گروپ نیٹو میں شامل ہونے والا پہلا ایشیائی ملک کون سا بن گیا؟
A. China
B. North Korea
C. South Korea
D. Pakistan
Explanation
South Korea became the first country to join NATO`s Cooperative Cyber Defense Center of Excellence as a contributor in May 2022
NATO (North Atlantic Treaty Organization) is an international alliance that consists of 30 member states from North America and Europe.
Show/Hide Explanation
کمپیوٹر میں وائرس کہاں سے آسکتا ہے؟
A. internet
B. none of the above
C. both A and B
D. Email
Explanation
the computer can get a virus in Email and in internet
An email virus looks simple but can erase files , destroy information and cause computer crashes
******
Other Questions Related to "COMPUTER VIRUS"
A computer virus is
deliberately created
***
Computer Virus operates by:
Dormancy and Replication
***
Which is the first computer virus in World?
Creeper
***
First, ever computer virus was created from -------:
Pakistan ND11-3-2023
Show/Hide Explanation
دنیا کا پہلا کمپیوٹر وائرس کون سا ہے؟
A. Creeper
B. I Love You
C. Sasser
D. Blaster
Explanation
Creeper virus Initial release date: 1971
Creeper virus Developer : Ray Tomlinson
Creeper virus was created in 1971by Bob Thomas
Creeper virus Operating system(s) affected: TENEX
Creeper was the first computer worm,
while
Reaper was the first antivirus software
Show/Hide Explanation
سائبر کرائم کا تعلق کس سے ہے؟
A. Computer
B. Cellphone
C. Railway
D. Aircraft
Explanation
Cybercrime refers to illegal activities carried out using computers or the internet.
Including hacking, data theft, and online fraud.
Show/Hide Explanation
A. internet
B. computer devices
C. none
D. both
Explanation
Cyber Unit of police has been established to curb following crimes and fraud
SIMs,
Internet
Chips
__________________
cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.
Show/Hide Explanation
A. Computer hardware or software used by home owners with computers
B. Computer hardware or software that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access
C. A device that connects computers together
D. A device that protects you from a fire
Explanation
A firewall i s a software or firmware that prevents unauthorized acces s to a network.
A firewall inspects incoming and outgoing traffi c using a set of rules to identify and block threats.
Show/Hide Explanation
وہ کونسی تکنیک ہے جس کے ذریعے پاس ورڈ اور صارف نام چوری کیے جا سکتے ہیں؟
A. Phishing
B. Spamming
C. Hacking
D. Spoofing
Explanation
Phishing
A social engineering technique where hackers trick people into revealing their passwords by sending fake emails or messages.
The emails may appear to be from a reputable company or a friend
May include links to malicious websites or attachments
Show/Hide Explanation
درج ذیل میں سے کون سا سائبر کرائم کی قسم نہیں ہے؟
A. Damage to Data and systems
B. Data theft
C. Installing antivirus for protection
D. Forgery
Explanation
Installing antivirus software is a preventive measure, not a type of cyber-crime.
Show/Hide Explanation
✅ Correct: 0 |
❌ Wrong: 0 |
📊 Total Attempted: 0