🔥 Burn Fat Fast. Discover How! 💪

English MCQs & Quizzes

Logo of telegram channel english_mcqs_quizzes — English MCQs & Quizzes E
Logo of telegram channel english_mcqs_quizzes — English MCQs & Quizzes
Channel address: @english_mcqs_quizzes
Categories: Languages
Language: English
Subscribers: 9.15K
Description from channel

Join for Daily Important MCQs & Quizzes☑️ of English Grammar & Daily Vocab ✍️
✔Daily Target Material
✔Quizzes/Polls
✔Idioms and phrases
✔Synonyms
✔Antonyms
✔One word Substitution
Query ? Promotions?
✆ Contact @ask_agriguruji

Ratings & Reviews

5.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

2

4 stars

0

3 stars

0

2 stars

0

1 stars

0


The latest Messages 3

2022-06-24 09:44:47 ANSWERS:

1. (A)      2. (C)    3. (C)      4. (A)      5. (D)

Join @english_mcqs_quizzes
42 views06:44
Open / Comment
2022-06-24 09:44:47 Cloze test set 1

Join @english_mcqs_quizzes

Directions (1-5): In the following passage, some of the words have been left out. Read the passage carefully and select the correct answer for the given blank out of the four alternatives.

India is a country that loves decentralization and it covers almost every ……(1)……… . I will focus ……(2)……… the subject of tyranny. For example, look ……(3)……… our police stations. We …(4)………… a Hobbesian sovereign ruling over us. In political ……(5)………, one has what is called the concept of sovereignty which is discussed in Hobbesian terms.

Q1.Country that loves decentralization and it covers almost every ……………
(a) area
(b) volume
(c) range
(d) size

Q2. I will focus …………… the subject of tyranny
(a) in
(b) to
(c) on
(d) near

Q3. For example, look …………… our police stations
(a) into
(b) upon
(c) at
(d) towards

Q4. We …………… a Hobbesian sovereign ruling over us.
(a) do not need
(b) are not needing
(c) shall not need
(d) won’t be needing

Q5. In political ……………, one has what is called the concept of sovereignty which is discussed in Hobbesian terms.
(a) aesthetics
(b) metaphysics
(c) outlook
(d) philosophy
41 views06:44
Open / Comment
2022-06-24 09:44:34 Solutions


S1. Ans.(b)

Sol. It is mentioned in the passage that Cyber Security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change.


S2. Ans.(c)

Sol. The reason mentioned in the paragraph for cyber threats is “due to negligence and vulnerabilities, or unintentional accidents.”


S3. Ans.(c)

Sol. information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.


S4. Ans.(d)

Sol. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program


S5. Ans.(b)

Sol. The appropriate title for the given passage would be ‘Cybercrime and hacking’.


S6. Ans.(d)

Sol. malicious- characterized by malice; intending or intended to do harm.

vitriolic-filled with bitter criticism or malice.

hence, these two words are synonyms to each other.


S7. Ans.(d)

Sol. Felonious-relating to or involved in crime.

hence illegal and Felonious are synonyms to each other.


S8. Ans.(a)

Sol. accredit-(of an official body) give authority or sanction to (someone or something) when recognized standards have been met.

hence, accredit and unauthorized are antonyms to each other.


S9. Ans.(a)

Sol. malapropos-in an inopportune or inappropriate way.

hence, malapropos and appropriate are antonyms.


S10. Ans.(c)

Sol. fortuitously- Happening by accident or chance. Hence, fortuitously and unintentional are synonyms to each other.
18 views06:44
Open / Comment
2022-06-24 09:44:34 Q1. According to the author what does the cyber security means?

(a) Cyber Security means the dispersion of important data and devise a structural engineering that allow easy flow of information

(b) Cyber Security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change.

(c) Cyber Security means the blocking of all the websites that are available in free domain

(d) Cyber Security means the Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents.

(e) None of the above


Q2. According to the author, what is the main reasons behind cyber threats?

(a) the unknown person with malice 

(b) due to intelligence, veneration and intentional threats.

(c) due to negligence and vulnerabilities, or unintentional accidents.

(d) by communicating through instant messages and emails to banking, travelling, studying and shopping on internet

(e) None of the above


Q3. What is the downside of Social media, according to the author? 

(a) the long hours usage of social media could affect an individual mentally and become the victim of depression

(b) by sharing sensitive information, one can be vulnerable to sudden outburst of emotions

(c) information shared by an individual for socializing purposes can be distorted and can be used for malignant purpose.

(d) the social media owners can steal the information and sell this information for monetary purposes

(e) None of the above


Q4.  According to this passage, how the virus gets into the computers?

(a) by saving data and clicking on the desktop

(b) by opening a document file in the search history

(c) by texting online and receiving files on social media platforms

(d) Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program

(e) None of the above


Q5. What will be the apt title for this passage?

(a) life hacks

(b) Cybercrime and hacking

(c) technology and its advantages

(d) technological advances

(e) The impact of social media


Q6. In the following question, find the word that is most similar in the meaning to the word ‘malicious’?

(a) benefactor

(b) benign

(c) benevolent

(d) vitriolic

(e) vituperate


Q7. In the following question, find the word that is most similar in the meaning to the word “illegal”?

(a) symposium

(b) chagrin

(c) chauvinistic

(d) Felonious

(e) charlatan


Q8. In the following question, find the word that is opposite in the meaning to the word “unauthorized”?

(a) accredit

(b) unaccredited

(c) inadmissible

(d) increment

(e) liaison


Q9. In the following question, find the word that is opposite in the meaning to the word “appropriate”?

(a) malapropos

(b) opportunely

(c) sequestrate

(d) usurp

(e) commandeer


Q10. In the following question, find the word that is most similar in the meaning to the word “unintentional”?

(a) despotic

(b) harbinger

(c) fortuitously

(d) immaculate

(e) innocuous

Join @english_mcqs_quizzes
17 views06:44
Open / Comment
2022-06-24 09:44:34 Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behaviour in order to eliminate changes of cyber threats and thereby creating a safer online environment.

Join @english_mcqs_quizzes
15 views06:44
Open / Comment
2022-06-24 09:44:33 Rc by @english_mcqs_quizzes

Read the following paragraph. Some of the words have been highlighted in bold. Answer the questions based on this paragraph.


The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity.  A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.

Hacking of important data, network outages, computer viruses and other cyber related threats affect our lives that range from minor inconvenience to serious incidents. Cyber threats can be caused due to negligence and vulnerabilities, or unintentional accidents. The main objectives of such type of system attackers or hackers are to steal confidential information, to make illegal monetary transactions, to destroy or to change data and the like. System attackers can be terrorists, crackers or recreational hackers. They have a variety of tools that can harm or infect the computer; usually they use malicious logic or virus to gain unauthorized access to a computer. Opening email attachments that carry the virus, clicking malicious links or websites or unintentionally downloading a dangerous program are common ways through which a computer can be infected and data can be stolen.

As the number of data networks, digital applications, as well as internet and mobile users are growing, so do the chances of cyber exploitation and cyber crimes. Even a small mistake in securing data or bad social networking can prove to be extremely dangerous. If accounts are not properly secured, it makes easier for hackers or unauthorized users to spread viruses or social engineered attacks that are designed to steal data and even money. Such types of issues highlight the need for cyber security as an essential approach in protecting and preventing data from being used inappropriately.


In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction.

In today’s dynamic environment, cyber security has become vital for individuals and families, as well as organizations (such as military, government, business houses, educational and financial institutions, corporations and others) that collect and store a wide range of confidential data on computers and transmit that to other computers across different networks. For families, protection of children and family members from cyber crime has become substantially important. For an individual, protecting information


that could impact social life as well as personal finance is essential. The internet has provided a wide array of learning opportunities, but there are risks too. Photos, videos and other personal information shared by an individual on social networking sites such as Facebook, Twitter can be inappropriately used by others may lead to serious and even life-threatening incidents. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage.
16 views06:44
Open / Comment
2022-06-24 09:43:48 Ans :- BCAFED
16 views06:43
Open / Comment
2022-06-24 09:43:48 PARA JUMBLE

JOIN @english_mcqs_quizzes

A. While the candidature of Bihar Governor Ram Nath Kovind on behalf of the ruling party was a surprise, the response from the opposition in naming former Lok Sabha Speaker Meira Kumar was anything but that.

B. It may have the trappings of an ideological battle, but the 2017 presidential election has become a platform for political messaging.

C. With the Bharatiya Janata Party fielding an old party hand from the Dalit community, the opposition parties led by the Congress felt constrained to follow suit.

D. However, Prime Minister Narendra Modi and BJP president Amit Shah chose someone less known but from a disadvantaged community, with the clear intent of garnering the support of those outside the fold of the National Democratic Alliance, who cannot afford to be seen to be opposing a Dalit.

E. They may have hoped that the BJP would field someone from its old guard, in order to set the stage for a contest between a candidate ‘swathed in saffron’ and one with a secular report card.

F. This lent the unfortunate impression that the Congress and other parties had no clear choice of their own, and were only waiting to react.

JOIN @english_mcqs_quizzes
17 views06:43
Open / Comment
2022-06-24 09:38:59
The mid-day meal ensures ______ each child studying in a government school has at least one nutritious meal a day.
Anonymous Quiz
77%
that
23%
those
0%
these
0%
this
13 voters18 views06:38
Open / Comment
2022-06-24 09:38:58
Find wrongly spelt
Anonymous Quiz
0%
Finally
29%
Vocation
7%
Vacation
64%
Vaccien
14 voters18 views06:38
Open / Comment