Loading more MCQs...

JKSSB Panchayat Secretary 2025 Paper

Please Login to view more questions and Get a subscription to view all 100 questions. You can view 10 questions without a subscription.
Question 1 of 100

Which of these is not a proper solution to maintain confidentiality?

Explanation

Switching off the phone is not a confidentiality measure.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7573

Question 2 of 100

Which of the following information security technology is used for avoiding browser based hacking?

Explanation

Remote browser access isolates browsing activity, preventing browser-based hacking.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7572

Question 3 of 100

A unique piece of information that is used in encryption.

Explanation

Keys are unique pieces of information used in encryption/decryption.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7571

Question 4 of 100

The process of verifying the identity of a user.

Explanation

Authentication ensures the user is who they claim to be.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7570

Question 5 of 100

A graphics method in which one object is transformed into another.

Explanation

Morphing is the technique of smoothly transforming one image into another.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7569

Question 6 of 100

Spreadsheets in computer cannot

Explanation

Spreadsheets cannot create detailed graphics, but can do calculations and plots.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7568

Question 7 of 100

Which of them is NOT an ideal way of spreading the virus?

Explanation

Official Antivirus CDs are safe, others are possible virus carriers.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7567

Question 8 of 100

Which of the following infects the master boot record and is a complex task to remove this virus?

Explanation

Boot Sector Viruses infect the MBR and are difficult to remove.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7566

Question 9 of 100

A system for transferring web documents that defines how messages are formatted and transmitted over internet is

Explanation

HTTP (Hypertext Transfer Protocol) defines message formatting and transmission.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7565

Question 10 of 100

Which of the following is a cloud-based version of Microsoft Office?

Explanation

Microsoft 365 is the cloud-based version of MS Office.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 7564

Login to view more questions

Login to Continue
Please Login to view more questions and Get a subscription to view all 100 questions. You can view 10 questions without a subscription.