IBA BPS05-15 Jobs Preparation
Everyday Science MCQs
IBA past papers
PAST PAPERS
NTS IBA PTS STS
JOB PREPARATION
NAB FIA JOB
Sindhi Mock Test
PST JEST HST SST IBA, NAB, FIA, CSS, CCE, PTS, CTS, NTS Job Preparation MCQs, past papers, test material, Sindh Public Service Commission, Sindh Education & literacy department, HST General, HST Science, Error detection, Error correction , Computer Science MCQs, Vaccinator MCQs, Sindh Commission MCQs
Computer Ethics / Virus / Hacking MCQs Online test for HST SST BPS16 & Other Jobs Online MCQs test
Get link
Facebook
X
Pinterest
Email
Other Apps
-
Computer Ethics, Virus, Hacking MCQs Online Test for HST SST BPS16 Sindh Commission & Other Jobs
Sindh Text Books/ Computer Ethics / Virus / Hacking MCQs Online Test for HST SST BPS16 Sindh Commission & Other Jobs
This topic has been taken from Sindh text books and Punjab text books. This chapter is helpful for competitive examinations including LDC, UDC, Assistant, teaching and non-teaching jobs. We have updated MCQs of this chapter plus theory. This can be helpful for SPSC Sindh Public Service Commission, FPSC Federal Public Service Commission, and Sukkur IBA tests of Teaching and non-teaching jobs.
Sindh Text Books/ Computer Ethics / Virus / Hacking MCQs Online test for HST SST BPS16 Sindh Commission & Other Jobs Online MCQs test.
This topic has been taken from Sindh text books and Punjab text books: This chapter is helpful for competitive examinations including LDC, UDC, Assistant, teaching and non-teaching jobs. We have updated MCQs of this chapter + theory. This can be helpful for SPSC Sindh Public Service Commission, FPSC Federal Public Service Commission and Sukkur IBA tests of Teaching and non-teaching jobs.
Hacking is perhaps the most common crime in the computer world.
Hackers can steal our WiFi, email or social media accounts' passwords.
Hackers also attack a website and take it down. However, the scope of hacking is much wider. The hackers can also steal sensitive information from government and business organizations, make fraudulent transactions and erase data on the cloud or network computers.
(ii) Credit and Debit Card Scam:
Keeping debit or credit cards is a common practice but insecure use of these cards can be dangerous. If a person has information about our debit or credit card he or she can make fraudulent transactions. There are various ways to get this information. One way is through scamming.
Scammers set small machines inside an ATM or credit card machine.
These machines copy the data which is then misused by the scammers.
Debit and credit cards are also secured with PIN codes. User has to keep this code secret otherwise any person can use the card for online shopping and other purposes. All he or she needs to know our credit card number, PIN and security code printed on the back of the cards.
(iii) Phishing
Phishing is a method of trying to gather personal information using false e-mails and websites. In Phishing, perpetrators contact the target person through email, telephone or text message and pose as a legitimate and trusted
individual. He or she asks the target to provide sensitive data such as personally identifiable information, banking and credit card details and passwords for different reasons. The information is then used to access different accounts and can result in identity theft and financial loss.
(iv) Clickjacking
Have you ever seen any video tagged as "OMG? You won't believe what this boy has done!" or did you find a button on a website that asked to click to claim a reward you had never applied for? This is a kind of fraud which is called Clickjacking. Usually, culprits target children or novice internet users to click on a link containing malware or trick them into sharing private information via social media sites.
(v) Cyber Bullying or Harassment
Electronic means like a computer, mobile phone or internet are also used for online bullying or harassment. Harmful bullying behavior can include posting rumors, threats, passing inappropriate remarks, leaking personal information, blackmailing and committing hate speech. The perpetrator does it with the intent to cause harm to the victim. Victims may experience lower self-esteem, intent to commit suicide and a variety of negative emotional responses, including being scared, frustrated, angry and depressed.
5.1.4 Cyber Attack
Cyber-attacks occur when a cybercriminal uses computer or any device to launch attacks to other single or multiple computer networks.
The culprit tries to enter in a computer system and network through cracking, scam links, phishing or any other method. Generally cyber- attacks are committed for getting any benefit or causing harm to victim computer, network or websites. A cyber-attack either disables the targeted computer, deletes information or knocks it offline. It may also steal information from the computer or network.
5.2 MALWARE
The term malware is the contraction of malicious software. Malwareis a broad term that encompasses computer viruses, worms, spyware,adware and others. Malware is a program that is written generally tocause a mess. They can be so dangerous that they can also damagedevices. However commonly malware encrypt, steal or delete data, hijackcore functions of computing and disturb different activities.
5.2.1 Different Malware
Types of malware can inchude computer viruses, worms, adware,
and spyware.
(1) Computer Virus
A computer virus is a computer program that can spread acrosscomputers and networks by making copies of itself, usually without theuser's knowledge. It can also modify other computer programs, insert itsown code and change computer settings. Viruses are harmful. They canrange from displaying irritating messages to make all the documentsinaccessible or even delete them. Viruses generally latch on a host file andwhen they execute they infect other files or programs. Boot Sector,Resident, Macro Viruses and File infector are some examples of viruses.
(ii) Worm
A computer worm spreads copies of itself from computer tocomputer. A worm can replicate itself without any human interaction.does not need to attach itself to a file or program to cause damage. It cando several malicious tasks, such as dropping other malware, copying itselfonto devices physically attached to the affected system, deleting fles, andconsuming internal storage and memory resources.
(iii) Adware
Adware is advertising-supported software. They present endlessads and pop-up windows that could potentially consume memory andprocessing resources. Adware can also change the different settings ofinternet browsers like homepage and default search engine. Normally,these are not as dangerous as other malware. However, Adware annoysthe user and slows down the processing. The advertisements produced byadware are sometimes in the form of a pop-up or sometimes in littlewindows that many not be closed. Adware programs include games,desktop toolbars or utilities. Commonly, adware is web-based and collectsweb browser data to target advertisements, especially pop-ups.
(iv) Spyware
Spyware is a malware that monitors a device and steals importantinformation about a person or organization without their consent andsends such information to another person or organization. Spyware takescontrol over a mobile phone or computer without the user's knowledge.
They capture information like web browsing history, e-mail messages,usernames and passwords and online payment information. Spyware can
come through cookies or even when we install software without reading itsterms and conditions. System monitors, cookies trackers, rootkits andkey-loggers are few examples of Spyware.
Understanding the Benazir Income Support Programme (BISP) in Pakistan Benazir Income Support Programme (BISP): Empowering Women and Reducing Poverty in Pakistan BISP Benazir Income Support Program (BISP) Here you will learn about registration for Benazir income support program, Online status check, amount checking: ||بینظیر انکم سپورٹ پروگرام|| 👇پیسے چیک کریں 8171 Checking Check PMT Score The Poverty Means Test (PMT): اسکور ایک ضروری تشخیصی نظام ہے جسے حکومت پاکستا گھرانوں کی مالی حیثیت کا تعین کرنے کے لیے استعمال کرتی ہے۔ یہ یقینی بنانے میں اہم کردار ادا کرتا ہے کہ حکومتی سبسڈیز، مالی امداد، اور فلاحی پروگرام سب سے زیادہ مستحق افراد اور خاندانوں تک پہنچیں۔ پی ایم ٹی سکور کا حساب مختلف عوامل کی بنیاد پر کیا جاتا ہے جیسے کہ آمدنی، گھریلو سائز، اور اثاثوں کی ملکیت *Poverty Means Test (PMT) Score: A Crucial Evaluation Tool* In Pakistan, the Government utilizes the Poverty Means Test (PMT) Score to assess the economic...
IBA BPS05-15 Job Preparation | PST JEST Past Papers & MCQs | Sindh Text Books IBA 2021 PST JEST Past Papers IBA 2021 PST JEST Past Papers If you are looking for the IBA Past Papers of PST JEST 2021, you are on the right place. Here is a PDF of all tests of JESTs and PSTs that you may get an experience. Be prepared! New 29000 PST JESTs Vacancies are soon to be announced. Related post: IBA JEST 2007 Papers Tags: IBA 2021, PST JEST Past Papers, IBA Past Papers, PST JEST 2021, Exam Preparation, Teaching Jobs, IBA JEST 2007 Papers Hashtags: #IBA2021, #PSTJESTPastPapers, #TeachingJobs, #ExamPreparation, #IBAJEST2007Papers IBA 2021 PST JEST past Papers If you are looking for the IBA Past Papers of PST JEST 2021, you are on right place. Here is pdf of all tests of JESTs and PSTs that you may get an experience. Be prepared! New 29000 PST JESTs Vac...
SIBA Police Mock Tests: Pattern and Preparation Tips SIBA Police (2) Free Mock Tests: Pattern and Preparation Tips for Constable and ASI Positions We are updating here mock tests helpful for Sindh Police constable and ASI test pattern, past papers of ASI and Constable, Mock tests and we also mock tests for Sindh Police tests. Here we have updated Sindh Police Online mock tests that you may practice, assess yourself and be mentally prepared for the upcoming police tests. Tags: SIBA Police, Free Mock Tests, Sindh Police, Constable, ASI, Test Pattern, Preparation Tips, Online Mock Tests, Past Papers, Police Test Preparation Hashtags: #SIBAPolice, #FreeMockTests, #SindhPolice, #Constable, #ASI, #TestPattern, #PreparationTips, #OnlineMockTests, #PastPapers, #PoliceTestPreparation SIBA Police Recruitment Test Pattern and Preparation Guide SIBA Police (2) Free Mock Tests: Pattern and Pr...
Comments
Post a Comment