الیکٹرانک سپیم کی ایک قسم ہے جہاں ای میل کے ذریعے کونسے غیر مطلوب پیغامات بھیجے جاتے ہیں؟
A. spam mail
B. cram mail
C. Trash mail
D. draft mail
Explanation
E-mail stands for: Electronic Mail
Father of E-mail: Ray Tomlinson
First E-mail sent: 1971
@ is used to divide an email into: two parts
SMTP helps to send: E-mails
SMTP stands for: Simple Mail Transfer Protocol
Received email is saved: inbox
Sent email is saved in: sent box
Maximum attachment size in Yahoo Email: 25 MB
G-mail stands: Google Mail
Email spam also called: junk email
To close email account click: sign out
To create new E-mail: Sign Up
Email hacking means: Illegal access to open email accounts of others Junk email is also called: Spam
At sign ( @ ): always a part of email address
Sending an E-mail is similar to: writing a letter
A allows us to access our e-mail from anywhere: Webmail interface
Bookmark : is associated with Internet E-mail
Show/Hide Explanation
اینٹی وائرس سافٹ ویئر کون سا ہے؟
A. Both A and C
B. Oracle
C. NAV
D. Avast
Explanation
Avast and NAV a re anti-virus software
***
Symantec's Norton Group launched Norton AntiVirus 1.0 (NAV) for PC and compatible computers.
***
Avast's free antivirus software detects and blocks all types of malware in real-time to prevent them from infecting your computer.
Kaspersky, Norton, and Avast are anti-virus software
Linux i s an operating system, not an anti-virus
Anti virus
Show/Hide Explanation
سیکیورٹی سسٹم اور مجرمانہ تفتیش میں کون سا استعمال ہوتا ہے؟
A. processor
B. Bar code reader
C. Finger print reader
D. robots
Explanation
A fingerprint scanner is indeed a type of device that recognises and verifies a person's fingerprints in order to allow or refuse the use of a physical space or computer system.
Show/Hide Explanation
A. Both A and B
B. malicious software
C. malicious hardware
D. None of the above
Explanation
میلویئر نقصان دہ سافٹ ویئر کی مختصر شکل ہے۔
malicious software نقصان دہ سافٹ ویئر
Show/Hide Explanation
فائر وال کو مواصلاتی نیٹ ورک/سسٹم میں تحفظ کے لیے کیا استعمال کیا جاتا ہے؟
A. Virus attack
B. Data driven attack
C. Unauthorized attack
D. Fire attack
Explanation
A firewall i s a software or firmware that prevents unauthorized acces s to a network.
A firewall inspects incoming and outgoing traffi c using a set of rules to identify and block threats.
****
Show/Hide Explanation
A. Provide remote control for an attacker to use an infected machine.
B. All of the above
C. Investigate the infected user’s local network.
D. Steal sensitive data.
Explanation
میلویئر حملہ آور کو متاثرہ مشین استعمال کرنے کے لیے ریموٹ کنٹرول فراہم کرتا ہے۔
میلویئر متاثرہ صارف کے مقامی نیٹ ورک کی چھان بین کرتا ہے۔
میلویئر حساس ڈیٹا چوری کرتا ہے۔
Show/Hide Explanation
✅ Correct: 0 |
❌ Wrong: 0 |
📊 Total Attempted: 0