Chapter 4 : Web Applications & Security

1 / 50

Why is cyber security important?

2 / 50

Which type of software can secretly record user activities?

3 / 50

Which of the following is a safe email practice?

4 / 50

What should be done regularly to improve security?

5 / 50

Which of the following is an online collaboration tool?

6 / 50

What is the purpose of CAPTCHA?

7 / 50

Which of the following is good netiquette?

8 / 50

What is digital footprint?

9 / 50

Which cybercrime involves identity theft online?

10 / 50

Which of the following helps protect data online?

11 / 50

Which of the following is an example of two-factor authentication?

12 / 50

What is the full form of WWW?

13 / 50

What should you do before downloading files from the internet?

14 / 50

Which application is commonly used for video conferencing?

15 / 50

What is e-learning?

16 / 50

Which of the following is not a web browser?

17 / 50

What is the use of Incognito Mode?

18 / 50

Which feature helps visually impaired users browse the internet?

19 / 50

Which of the following is a social networking site?

20 / 50

Uploading means:

21 / 50

What is meant by downloading?

22 / 50

Which of the following can spread through email attachments?

23 / 50

Cookies in web browsers are used to:

24 / 50

Which of the following is a secure practice for online banking?

25 / 50

What is cyber safety?

26 / 50

Which browser was developed by Microsoft?

27 / 50

What is the function of bookmarks in a browser?

28 / 50

Spam emails are usually:

29 / 50

Which of the following is a web-based email service?

30 / 50

Which extension indicates a secure website certificate?

31 / 50

Which of the following is safe while browsing?

32 / 50

What is a firewall used for?

33 / 50

Which type of attack sends fake emails to users?

34 / 50

Which of the following should not be shared with anyone?

35 / 50

What is the full form of OTP?

36 / 50

Which of the following is an example of cloud storage?

37 / 50

Which service allows storing files on the internet?

38 / 50

Which of the following is used for online communication?

39 / 50

Which symbol is commonly seen in email addresses?

40 / 50

Which of the following is an example of malware?

41 / 50

What is the purpose of an antivirus software?

42 / 50

Which of the following is a strong password?

43 / 50

What is phishing?

44 / 50

Which key is used to refresh a webpage?

45 / 50

Which of the following is a search engine?

46 / 50

What is the full form of HTTP?

47 / 50

Which protocol is commonly used for secure websites?

48 / 50

What does URL stand for?

49 / 50

Which of the following is an example of a web browser?

50 / 50

What is the main purpose of a web browser?

Your score is

The average score is 0%