After a software is uninstalled, residual entries often remain in the:
- aRAM
- bRegistry
- cCache
- dBIOS
170 questions · 15 sections
After a software is uninstalled, residual entries often remain in the:
The tool used to edit the Windows Registry is opened by typing:
To find the next registry match, the key pressed on the keyboard is:
The drive that contains the operating system is typically:
Before editing the registry, it is very important to:
The 'Find' option in the Registry Editor is used to search for the:
After right-clicking on a found registry entry, the option selected to remove it is:
The group activity asks students to compare:
Pressing 'F3' in the Registry Editor performs the action of:
The complete deletion process ends after removing all matching entries from the:
Today, information has become one of the most:
The two main types of access to information are:
Open data is characterised by:
Examples of open information include:
Open data does NOT require:
Confidential information is restricted to:
Examples of confidential information include:
Disclosure of confidential information without permission may result in:
Confidential data is protected by:
Best way to protect confidential information is to:
Digital technology processes data in:
Tasks enabled by digital technology include:
The cyber-world is best described as:
The cyber-world is built on:
The current age dominated by digital technology is called the:
With widespread adoption of digital technology, individuals are exposed to:
The cyber-world:
Information transmitted in binary form is processed by:
People interact in the cyber-world primarily via:
Personal information sharing through digital technology is essential to meet:
Any action that violates societal norms or the law is called a:
When such actions are carried out online or via the Internet, they are called:
Cyber crimes typically involve:
In a cyber attack, the targeted entities can include:
Cyber criminals can:
To stay safe from cybercrimes, everyone must:
Cybercrimes pose unique risks to:
Examples of cybercrimes mentioned in the chapter include:
Computer Malware is best described as a:
Data Interruption is classified as a form of:
Hacking is usually accessing or controlling a system:
The person who carries out hacking is called a:
Hacking can be:
Hackers hired by organizations to test their systems are called:
Legitimate (hired) hackers:
The text mentions legitimate hackers are common for checking which system?
People who do illegal hacking are also called:
Black hat hackers use the Internet and networks to:
The trend of hacking crime is:
Through hacking, attackers can:
The real-life analogy used for a brute force attack is:
Digital criminals usually carry out brute force using:
Common targets of a brute force attack include:
Brute force attempts:
After a successful brute force attack, criminals typically:
In a brute force attack, the attacker tries:
Brute force relies on:
Tools used in brute force attacks are typically:
Defense against brute force as mentioned in the chapter includes:
Brute force attack is considered a:
The real-life analogy used for data interception is:
In data interception, the interceptor sits between:
The process of theft during data exchange is called:
Software/apps commonly use which method to prevent data interception?
End-to-end encryption protects:
Encryption is the process of:
After encryption, data becomes:
Confidential information transmitted over public networks is typically:
Encryption ensures:
Without proper authorization, encrypted data is:
DDoS stands for:
The real-life analogy used for DDoS is:
A DDoS attack uses:
DDoS attackers attack the target:
DDoS effects on a website include:
The goal of a DDoS attack is to:
DDoS impersonates the system so that:
DDoS attacks flood services with:
Devices used in a DDoS attack are typically:
DDoS attacks primarily target:
Malware is short for:
Malware is software designed to:
Targets of malware include:
Software that unintentionally causes a problem due to incompetence is called:
Malware is used to:
Types of malware include:
Spyware, Ransomware and Adware are types of:
Rootkits and Spamming are also types of:
Malware works against the interest of the:
The difference between malware and a software bug is that:
Intentionally and repeatedly harming someone mentally online is called:
Examples of cyber bullying mentioned include:
Forcing a person to do something through ICT is called:
Cyber terrorism includes:
Publishing someone's personal information or pictures without permission is part of:
Spreading rumors on social media to incite communal hatred is part of:
Devices used for cyber terrorism include:
Cyber terrorism is most common among:
Effects of cyber terrorism on victims include:
After publishing information on social media, deleting it is:
Identifying the source of a fake ID is generally:
Cyber terrorism affects the victim's:
Channels used for cyber terrorism include:
Spreading communal hatred on social media is:
Cyber bullying causes the victim to feel:
Fake news is best defined as:
Fake news is intentionally spread to:
Channels for spreading fake news include:
In the age of social media overuse, the spread of fake news is happening at:
Fake news around the world has led to many:
The proverb used as analogy in the chapter is:
Online posts and news should always be:
Fake news is often spread using:
Per the Bangladesh Information and Technology Act 2006, the maximum imprisonment for cyber bullying / fake news is:
Per the ICT Act 2006, the maximum fine is:
The National Helpline number to contact in Bangladesh is:
The National Emergency Service number is:
Besides 109, another helpline mentioned for cyber issues is:
Complaints can be filed on the website:
The issue should be shared with:
In case of a cyber attack, digital devices should be:
A written complaint should be submitted to the:
The issue should NOT be:
A General Diary (GD) should be filed at the:
Consumer's rights need to be:
Evidence of the crime should be:
In Bangladesh, a General Diary can now be filed:
The website used for filing an online GD is:
Law enforcement units that have mobile apps include:
After GD, an additional unit that can be contacted is:
Strategies for safe Internet use include:
To enhance account security, you should:
Computer software should be updated:
Mobile application software should be updated:
On social media, one should refrain from:
Personal confidential information such as PIN or password should:
To protect a device, one should install:
Reusing the same password across all platforms is:
Antivirus and firewall protection are types of:
Security strategies aim to protect:
2FA stands for:
After ID and password login, 2FA requires entering a/an:
OTP stands for:
The OTP digit length mentioned in the text is:
The OTP is sent to the user's:
Without entering the correct OTP, you:
The OTP is valid for:
After being used once, the OTP:
The same OTP:
Enabling 2FA makes hacking accounts:
2FA can strengthen:
With only a password and no 2FA, accounts are:
After enabling 2FA, login requires:
The OTP system reduces the risk of:
Benefits of 2FA include:
Among the following, which is NOT a cybercrime?
Among the following, which is malware?
Encryption mainly ensures:
Cyber bullying is punishable per:
Among the following, which can now be done online in Bangladesh?
Stealing emails of others is a form of:
Defense against brute force as per the chapter includes:
To keep a device secure, one should:
Among the following, which is most often used by hackers to find passwords?
The most valuable resource today is:
The cyber-world is part of which industrial era?
To prevent confidential information exposure, share it with:
The cyber-world expands continuously through:
White hat hackers help to:
The OTP in 2FA is bound by: