Chapter 4 : Web Applications & Security
1 / 50
Why is cyber security important?
2 / 50
Which type of software can secretly record user activities?
3 / 50
Which of the following is a safe email practice?
4 / 50
What should be done regularly to improve security?
5 / 50
Which of the following is an online collaboration tool?
6 / 50
What is the purpose of CAPTCHA?
7 / 50
Which of the following is good netiquette?
8 / 50
What is digital footprint?
9 / 50
Which cybercrime involves identity theft online?
10 / 50
Which of the following helps protect data online?
11 / 50
Which of the following is an example of two-factor authentication?
12 / 50
What is the full form of WWW?
13 / 50
What should you do before downloading files from the internet?
14 / 50
Which application is commonly used for video conferencing?
15 / 50
What is e-learning?
16 / 50
Which of the following is not a web browser?
17 / 50
What is the use of Incognito Mode?
18 / 50
Which feature helps visually impaired users browse the internet?
19 / 50
Which of the following is a social networking site?
20 / 50
Uploading means:
21 / 50
What is meant by downloading?
22 / 50
Which of the following can spread through email attachments?
23 / 50
Cookies in web browsers are used to:
24 / 50
Which of the following is a secure practice for online banking?
25 / 50
What is cyber safety?
26 / 50
Which browser was developed by Microsoft?
27 / 50
What is the function of bookmarks in a browser?
28 / 50
Spam emails are usually:
29 / 50
Which of the following is a web-based email service?
30 / 50
Which extension indicates a secure website certificate?
31 / 50
Which of the following is safe while browsing?
32 / 50
What is a firewall used for?
33 / 50
Which type of attack sends fake emails to users?
34 / 50
Which of the following should not be shared with anyone?
35 / 50
What is the full form of OTP?
36 / 50
Which of the following is an example of cloud storage?
37 / 50
Which service allows storing files on the internet?
38 / 50
Which of the following is used for online communication?
39 / 50
Which symbol is commonly seen in email addresses?
40 / 50
Which of the following is an example of malware?
41 / 50
What is the purpose of an antivirus software?
42 / 50
Which of the following is a strong password?
43 / 50
What is phishing?
44 / 50
Which key is used to refresh a webpage?
45 / 50
Which of the following is a search engine?
46 / 50
What is the full form of HTTP?
47 / 50
Which protocol is commonly used for secure websites?
48 / 50
What does URL stand for?
49 / 50
Which of the following is an example of a web browser?
50 / 50
What is the main purpose of a web browser?
Your score is
The average score is 0%