IBA BPS05-15 Jobs Preparation
Everyday Science MCQs
IBA past papers
PAST PAPERS
NTS IBA PTS STS
JOB PREPARATION
NAB FIA JOB
Sindhi Mock Test
PST JEST HST SST IBA, NAB, FIA, CSS, CCE, PTS, CTS, NTS Job Preparation MCQs, past papers, test material, Sindh Public Service Commission, Sindh Education & literacy department, HST General, HST Science, Error detection, Error correction , Computer Science MCQs, Vaccinator MCQs, Sindh Commission MCQs
Computer Ethics / Virus / Hacking MCQs Online test for HST SST BPS16 & Other Jobs Online MCQs test
Get link
Facebook
X
Pinterest
Email
Other Apps
-
Computer Ethics, Virus, Hacking MCQs Online Test for HST SST BPS16 Sindh Commission & Other Jobs
Sindh Text Books/ Computer Ethics / Virus / Hacking MCQs Online Test for HST SST BPS16 Sindh Commission & Other Jobs
This topic has been taken from Sindh text books and Punjab text books. This chapter is helpful for competitive examinations including LDC, UDC, Assistant, teaching and non-teaching jobs. We have updated MCQs of this chapter plus theory. This can be helpful for SPSC Sindh Public Service Commission, FPSC Federal Public Service Commission, and Sukkur IBA tests of Teaching and non-teaching jobs.
Sindh Text Books/ Computer Ethics / Virus / Hacking MCQs Online test for HST SST BPS16 Sindh Commission & Other Jobs Online MCQs test.
This topic has been taken from Sindh text books and Punjab text books: This chapter is helpful for competitive examinations including LDC, UDC, Assistant, teaching and non-teaching jobs. We have updated MCQs of this chapter + theory. This can be helpful for SPSC Sindh Public Service Commission, FPSC Federal Public Service Commission and Sukkur IBA tests of Teaching and non-teaching jobs.
Hacking is perhaps the most common crime in the computer world.
Hackers can steal our WiFi, email or social media accounts' passwords.
Hackers also attack a website and take it down. However, the scope of hacking is much wider. The hackers can also steal sensitive information from government and business organizations, make fraudulent transactions and erase data on the cloud or network computers.
(ii) Credit and Debit Card Scam:
Keeping debit or credit cards is a common practice but insecure use of these cards can be dangerous. If a person has information about our debit or credit card he or she can make fraudulent transactions. There are various ways to get this information. One way is through scamming.
Scammers set small machines inside an ATM or credit card machine.
These machines copy the data which is then misused by the scammers.
Debit and credit cards are also secured with PIN codes. User has to keep this code secret otherwise any person can use the card for online shopping and other purposes. All he or she needs to know our credit card number, PIN and security code printed on the back of the cards.
(iii) Phishing
Phishing is a method of trying to gather personal information using false e-mails and websites. In Phishing, perpetrators contact the target person through email, telephone or text message and pose as a legitimate and trusted
individual. He or she asks the target to provide sensitive data such as personally identifiable information, banking and credit card details and passwords for different reasons. The information is then used to access different accounts and can result in identity theft and financial loss.
(iv) Clickjacking
Have you ever seen any video tagged as "OMG? You won't believe what this boy has done!" or did you find a button on a website that asked to click to claim a reward you had never applied for? This is a kind of fraud which is called Clickjacking. Usually, culprits target children or novice internet users to click on a link containing malware or trick them into sharing private information via social media sites.
(v) Cyber Bullying or Harassment
Electronic means like a computer, mobile phone or internet are also used for online bullying or harassment. Harmful bullying behavior can include posting rumors, threats, passing inappropriate remarks, leaking personal information, blackmailing and committing hate speech. The perpetrator does it with the intent to cause harm to the victim. Victims may experience lower self-esteem, intent to commit suicide and a variety of negative emotional responses, including being scared, frustrated, angry and depressed.
5.1.4 Cyber Attack
Cyber-attacks occur when a cybercriminal uses computer or any device to launch attacks to other single or multiple computer networks.
The culprit tries to enter in a computer system and network through cracking, scam links, phishing or any other method. Generally cyber- attacks are committed for getting any benefit or causing harm to victim computer, network or websites. A cyber-attack either disables the targeted computer, deletes information or knocks it offline. It may also steal information from the computer or network.
5.2 MALWARE
The term malware is the contraction of malicious software. Malwareis a broad term that encompasses computer viruses, worms, spyware,adware and others. Malware is a program that is written generally tocause a mess. They can be so dangerous that they can also damagedevices. However commonly malware encrypt, steal or delete data, hijackcore functions of computing and disturb different activities.
5.2.1 Different Malware
Types of malware can inchude computer viruses, worms, adware,
and spyware.
(1) Computer Virus
A computer virus is a computer program that can spread acrosscomputers and networks by making copies of itself, usually without theuser's knowledge. It can also modify other computer programs, insert itsown code and change computer settings. Viruses are harmful. They canrange from displaying irritating messages to make all the documentsinaccessible or even delete them. Viruses generally latch on a host file andwhen they execute they infect other files or programs. Boot Sector,Resident, Macro Viruses and File infector are some examples of viruses.
(ii) Worm
A computer worm spreads copies of itself from computer tocomputer. A worm can replicate itself without any human interaction.does not need to attach itself to a file or program to cause damage. It cando several malicious tasks, such as dropping other malware, copying itselfonto devices physically attached to the affected system, deleting fles, andconsuming internal storage and memory resources.
(iii) Adware
Adware is advertising-supported software. They present endlessads and pop-up windows that could potentially consume memory andprocessing resources. Adware can also change the different settings ofinternet browsers like homepage and default search engine. Normally,these are not as dangerous as other malware. However, Adware annoysthe user and slows down the processing. The advertisements produced byadware are sometimes in the form of a pop-up or sometimes in littlewindows that many not be closed. Adware programs include games,desktop toolbars or utilities. Commonly, adware is web-based and collectsweb browser data to target advertisements, especially pop-ups.
(iv) Spyware
Spyware is a malware that monitors a device and steals importantinformation about a person or organization without their consent andsends such information to another person or organization. Spyware takescontrol over a mobile phone or computer without the user's knowledge.
They capture information like web browsing history, e-mail messages,usernames and passwords and online payment information. Spyware can
come through cookies or even when we install software without reading itsterms and conditions. System monitors, cookies trackers, rootkits andkey-loggers are few examples of Spyware.
Understanding the Benazir Income Support Programme (BISP) in Pakistan Benazir Income Support Programme (BISP): Empowering Women and Reducing Poverty in Pakistan BISP Benazir Income Support Program (BISP) Here you will learn about registration for Benazir income support program, Online status check, amount checking: ||بینظیر انکم سپورٹ پروگرام|| 👇پیسے چیک کریں 8171 Checking بینظیر انکم سپورٹ پروگرام اہل ہونے کا 👇طریقہ بینظیر انکم سپورٹ پروگرام رجسٹریشن کا مکمل طریقہ 👇 Related Post: 👇 👇سندھ سیلاب متاثرین کیلئے مفت گھر بے نظیر انکم سپورٹ پروگرام (BISP) JazzCash کے وصول کنندگان اب اکاؤنٹ میں رجسٹر کر کے اپنے کفالت فنڈز، PKR 10,500 تک آسانی سے حاصل کر سکتے ہیں۔ اس شراکت داری نے ادائیگی کے عمل کو ہموار کر دیا ہے، اور مستحقین کو لمبی قطاروں میں انتظار کرنے کی ضرورت کو ختم کر دیا ہے۔ بی آئی ایس پی کے دفاتر۔" اہل ہونے کا طریقہ Related Post 👇 Online earning ka tarika 👇 Laptop se pesy...
HST SST Material| HST SST Preparation| Sindh Public Service Commission | General Science Categories. HST SST Help Portal👇 SST SLIPS Updated 👇 Click Here 👇 https://spsc.gov.pk/applyonline/sstadmission Free Material 👇 HST SST Sindh Text Pdf Books HST SST Past Papers HST SST Past Papers (2) Free SST Online mock tests 👇 HST SST Science Category Mock tests HST SST General category Mock Tests Social Work 👇 1 minute men 1 hazar kamain Contact for SST Science General category Online Mock tests and Pdf Books complete course 03243815168 Link for BOOKS Details 👇 General Science category pdf Books Related Post 👇 HST SST Complete course 1 Minute men 1000 kamain Home
SPSC | HST SST BPS16| Science category MCQs Part(2) Science Category MCQs set1👇 SST BPS16 Science category 50 MCQs Science Category MCQs set2👇 SST Science MCQs Set2 Related Post 👇 SST BPS16 Science category MCQs Part1 SPSC SST BPS16 GENERAL SCIENCE CATEGORY NOTES 👇 SPSC SST BPS16 Book details Every Aspirant of Secondary School Teacher BPS16 Sindh Public Service Commission will face 50% MCQs (Chemistry , Physics, Maths, Biology & Computer) Practice above MCQs 👆 Title: Mastering the Science Category: A Guide to Prepare for the SST BPS-16 Examination Introduction: Aspiring candidates for the Secondary School Teacher (SST) BPS-16 examination in Sindh must dedicate significant attention to the Science category section. Comprising subjects like Chemistry, Computer, Physics, Maths, and Biology, this section holds a 50% weightage in the overall test. To help you prepare effectively for this section, we have compiled essential guidelines to ensure success in the Science c...
Comments
Post a Comment