Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Aug 13, 2023 10:41 AM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) A signature made in any electronic form to be included in the transformation of electronic record ...
Read More »Blog Archives
Q. What are the Different Security Threats?
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 21, 2023 11:03 AM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) There are computer security threats which can risk program, data and information at thelocal computer and ...
Read More »Define Cyber Crime and Cyber Law. What are the offences relating to computer based on ETA, 2063.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 09, 2023 02:45 PM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(1) Cyber Crime Any criminal activity that uses a computer or network as source, tool, target or ...
Read More »Q. Explain the role of Department of Information Technology for the development and implementation of Information Technology in various sectors of the government. [10]
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Mar 03, 2023 01:02 PM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Department of Information Technology plays vital role for the development and implementation of Information Technology. Working ...
Read More »Q. What do you understand by the Security Operation Center? Explain its key features? 2+3=5
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Feb 20, 2023 07:56 AM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Security Operation Center - A command center of responsible for monitoring, analyzing, and protecting an organization ...
Read More »Q. How does the use of digital signature ensure authenticity and integrity of message exchanged between two parties? Explain.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Feb 20, 2023 07:50 AM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Digital Signature - A signature made in any electronic form to be included in the transformation ...
Read More »Q. Describe the basic requirements defined by Government Website Development and Management Directive, 2078 for development and publishing of government websites. 10
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 1 GK SIR Feb 19, 2023 04:41 PM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) सरकारी कार्यालयको वेबसाईट निर्माण तथा व्यवस्थापन सम्वन्धी निर्देशिका २०७८ अनुसार वेबसाइट निर्माण तथा प्रकाशन सम्बन्धमा गरिएको ...
Read More »Q. What is cloud computing? What is the provision in ICT Policy 2072 regarding cloud computing? 5
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Feb 12, 2023 03:01 PM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Ans:- Cloud computing is the delivery of different services through the Internet. These resources include tools ...
Read More »Q. What are the disadvantages or negative impacts of social media in our society? List them.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 0 GK SIR Feb 09, 2023 07:44 AM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Ans::- The disadvantages of social media are increasing day by day which are given below: 1.Addiction ...
Read More »Q. Write about the Hacking in computer system.
Back to Archive Keyword Select Category All categories DatabaseFundamentalGeneralLegislation and ITNetworkingOperating SystemPresentationSpreadsheetWeb Page DesigningWord Processing Question Status AllProcessingHoldSolved Ask Question 1 GK SIR Feb 09, 2023 07:27 AM 0 Answers Legislation and IT Member Since Dec 2016 Subscribed Subscribe Not subscribe Cancel subscribe Flag(0) Ans. Computer hackers are unauthorized users who break into computer systems in order to steal, change ...
Read More »