Banking Exams Exam  >  Banking Exams Questions  >  Directions : Read the following paragraph. So... Start Learning for Free
Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.

The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity.  A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.
Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.
As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.
In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.
In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting information
that could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.
Q. What is the downside of Social media, according to the author? 
  • a)
    the long hours usage of social media could affect an individual mentally and become the victim of depression
  • b)
    by sharing sensitive information, one can be vulnerable to sudden outburst of emotions
  • c)
    information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.
  • d)
    the social media owners can steal the information and sell this information for monetary purposes
  • e)
    None of the above
Correct answer is option 'C'. Can you explain this answer?
Verified Answer
Directions : Read the following paragraph. Some of the words have been...
information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.
View all questions of this test
Explore Courses for Banking Exams exam
Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer?
Question Description
Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer? for Banking Exams 2024 is part of Banking Exams preparation. The Question and answers have been prepared according to the Banking Exams exam syllabus. Information about Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer? covers all topics & solutions for Banking Exams 2024 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer?.
Solutions for Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer? in English & in Hindi are available as part of our courses for Banking Exams. Download more important topics, notes, lectures and mock test series for Banking Exams Exam by signing up for free.
Here you can find the meaning of Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer?, a detailed solution for Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer? has been provided alongside types of Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Directions : Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected withmaliciouslogic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, orunintentionalaccidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gainunauthorizedaccess to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records fromillegalor unintended access,manipulation or destruction.In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting informationthat could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage inappropriateonline behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.Q. What is the downside of Social media, according to the author?a)the long hours usage of social media could affect an individual mentally and become the victim of depressionb)by sharing sensitive information, one can be vulnerable to sudden outburst of emotionsc)information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.d)the social media owners can steal the information and sell this information for monetary purposese)None of the aboveCorrect answer is option 'C'. Can you explain this answer? tests, examples and also practice Banking Exams tests.
Explore Courses for Banking Exams exam

Top Courses for Banking Exams

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev