The secret about that data received by the Facebook from you

The secret about that data received by the Facebook from you

Facebook receive variety of various kinds of data concerning you, that you would like to understand what data they collect concerning you. So, i'm writing here some data concerning this.

  1. Collects your data that is that the data that is needed once you sign on for the positioning like your name, email address, birthday, and gender. 
  2. The data you decide on to share on Facebook, like once you post a standing update, transfer a photograph, or investigate a friend's story. 
  3. Receive information concerning you whenever you move with Facebook, like once you examine another person's timeline, send or receive a message, explore for a friend or a Page, click on, read or otherwise move with things, use a Facebook mobile app, or purchase Facebook Credits or build different purchases through Facebook. 
  4. Once you post things like photos or videos on Facebook, they'll receive extra connected information (or metadata), like the time, date, and place you took the picture or video. 
  5. Receive information from the pc, mobile or different device you utilize to access Facebook, as well as once multiple users log in from identical device. This might embody your informational address and different data concerning things like your net service, location, the kind of browser you utilize, or the pages you visit. 
  6. Receive information whenever you visit a game, application, or website} that uses Facebook Platform or visit a site with a Facebook feature, generally through Cookies. This might embody the date and time you visit the site; the net address, or URL, you are on; technical data concerning the informational address, browser and also the software you use; and, if you're logged in to Facebook, your User ID. 
  7. Receive data that you simply value more highly to build public like your name, profile footage, cover photos, timeline, User ID, username, etc. and your public data are going to be accessible to the Facebook-integrated games, applications, and websites you and your friends use and can be show up once somebody will a search on Facebook or on a public computer program. 

Top 12 things needs to know by the Facebook user


Top 12 things needs to know by the Facebook user
1. You may not post unauthorized commercial communications (such as spam) on Facebook

2. You may not collect users' content or data, or otherwise access Facebook, exploitation machine-driven           means that (such as gather bots, robots, spiders, or scrapers) while not Facebook's previous permission.

3. You may not interact in unlawful multi-level selling, like a scheme, on Facebook.

4. You may not transfer viruses or alternative malicious code.

5. You may not solicit login data or access associate degree account happiness to some other person.

6. You may not bully, intimidate, or harass any user.

7. You may not post content that: is hate speech, threatening, or pornographic; incites violence; or contains status or graphic or gratuitous violence.

8. You may not develop or operate a third-party application containing alcohol-related, chemical analysis or alternative mature content (including advertisements) while not acceptable age-based restrictions.

9. You may follow our Promotions pointers and every one applicable laws if you publicize or provide any contest, giveaway, or sweepstakes (“promotion”) on Facebook.

10. You may not use Facebook to try to something unlawful, misleading, malicious, or discriminatory.

11. You may not do something that might disable, overburden, or impair the right operating or look of   Facebook, like a denial of service attack or interference with page rendering or alternative Facebook practicality.

12. You may not facilitate or encourage any violations of this Statement or Facebook's policies.

MCQ of Computer networking test with answer set-7

MCQ of Computer networking test with answer set-7


1. The examples of Interior Gateway Protocols (IGP) are.
i) Open Short Path First (OSPF)                                  ii) Routing Information Protocol (RIP)
iii) Border Gateway Protocol (BGP)
A)  i only
B) i, and ii only
C) i and iii only
D) All i, ii and iii

2. FTP server listens to connections on port …………………….
A) 19 and 20
B) 20 and 21
C) 21 and 22
D) 20 and 22


3. Which of the following operations can be performed by using FTP.
i) Connect to a remote host                        ii) Select directory
iii) Define the transfer mode                      iv) List file available
A) i, and ii only
B) i, ii and iii only
C) ii, iii and iv only
D) All i, ii, iii and iv

4. A ………….. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction.
A) infoset
B) clientinfo
C) cookie
D) transkie

5. Match the following HTTP status code to their respective definitions.
i) 400                                     a) OK
ii) 500                                    b)  Not found
iii) 200                                   c) Continue
iv) 100                                   d) Internal server error
A) i-b, ii-d, iii-a, iv-c
B) i-a, ii-b, iii-c, iv-d
C) i-b, ii-c, iii-a, iv-d
D) i-b, ii-a, iii-c, iv-d

6. Loopback address ……………………. of IPv6 address is equivalent to the IPV4 loopback address 127.0.0.1.
A) (: : 1)
B) (: : )
C) (: : 0)
D) (1 : : )

7. Unspecified address ………………….. of IPV6 address is equivalent to the IPV4 unspecified address 0.0.0.0.
A) (: : 1)
B) (: : )
C) (: : 0)
D) (1 : : )

8. A simple cabling method, known as the ……………… topology allows about 30 computers on a maximum cable length of about 600 feet.
A) Ring
B) Bus
C) Star
D) Mesh

9. The ……………… layer is responsible for resolving access to the shared media or resources.
A) Physical
B) Mac sub layer
C) Network
D) Transport

10. A WAN typically spans a set of countries that have data rates less than ……………. Mbps.
A) 2
B) 1
C) 4
D) 100
Answers:
1.       B) i, and ii only
2.       B) 20 and 21
3.       D) All i, ii, iii and iv
4.       C) cookie
5.       A) i-b, ii-d, iii-a, iv-c
6.       A) (: : 1)
7.       B) (: : )
8.       B) Bus
9.       B) Mac sub layer
10.   B) 1


Solved MCQ of Computer Networking test set-6

Solved MCQ of Computer Networking test set-6


1. ………………….. is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.
A) FDDI
B) FDDT
C) FDDR
D) FOTR   
     
2. Which of the following are Gigabit Ethernets?
A) 1000 BASE-SX
B) 1000 BASE-LX
C) 1000 BASE-CX
D) All of above

3. ………………….. is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
A) Ethernet
B) Fast Ethernet
C) Gigabit Ethernet
D) All of the above

4. …………… is another kind of fiber optic network with an active star for switching.
A) S/NET
B) SW/NET
C) NET/SW
D) FS/NET

5. The combination of ……………. And ………….. is often termed the local address of the local portion of the IP address.
A) Network number and host number
B) Network number and subnet number
C) Subnet number and host number
D) All of the above

6. ………………….. implies that all subnets obtained from the same subnet mask.
A) Static subnetting
B) Dynamic subnetting
C) Variable length subnetting
D) Both B and C

7. State whether true or false.
i) A connection oriented protocol can only use unicast addresses.
ii) The anycast service is included in IPV6.
A) True, True
B) True, False
C) False, True
D) False, False

8. The most important and common protocols associated TCP/IP internetwork layer are.
i) Internet protocol(IP)                                  ii) Internet control Message Protocol(ICMP)
iii) Bootstrap Protocol (BooTP)                   iv) Dynamic Host Configuration Protocol (DHCP)
v) Address Resolution Protocol (ARP)
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v

9.  …………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses.
A) Address Resolution Protocol (ARP)
B) Reverse Address Resolution Protocol (RARP)
C) Bootstrap Protocol (BOOTP)
D) Internet Control Message Protocol (ICMP)

10. Which of the following is not a mechanism that DHCP supports for IP address allocation?
A) Automatic allocation
B) Static allocation
C) Dynamic allocation
D) Manual allocation
Answers:
1.       A) FDDI
2.       D) All of above
3.       B) Fast Ethernet
4.       A) S/NET
5.       C) Subnet . host number
6.       A) Static subnetting
7.       A) True, True
8.       D) All i, ii, iii, iv and v
9.       A) Address …..(ARP)
10.   B) Static allocation


You may also wanted to view the following related posts

For other more Multiple Choice Questions (MCQs): Click Here

MCQ of Internet Security with answer set-2

MCQ of Internet Security with answer set-2


1.  The primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity.
A) SSL
B) ESP
C) TSL
D) PSL

2. The ……………. is used to provide integrity check, authentication and encryption to IP datagram.
A) SSL
B) ESP
C) TSL
D) PSL


3. In ……………………. mode, a common technique in packet-switched networks consists of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above

4. The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level.
A) IPsec
B) Netsec
C) Packetsec
D) Protocolsec

 5. At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ……………….
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol

6. While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server.
A) 420
B) 1032
C) 443
D) 322

7. On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the …………………
A) SSL handshake protocol
B) SSL authentication protocol
C) SSL record protocol
D) SSL cipher protocol

8. State whether the following statement are true.
i) An application-level gateway is often referred to as a proxy.
ii) In proxy, a direct connection is established between the client and destination server.
A) True, False
B) False, True
C) True, True
D) False, False

9. In packet-filtering router, the following information can be external from the packet header.
i) Source IP address                                        ii) Destination IP address
iii) TCP/UDP source port                                               iv) ICMP message type
v) TCP/UDP destination port
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v

10. …………….. mode is used whenever either end of a security association is gateway.
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
Answers:
1.       A) SSL
2.       B) ESP
3.       C) Both A and B
4.       A) IPsec
5.       C) SSL record protocol
6.       C) 443
7.       A) SSL hand... protocol
8.       A) True, False
9.       D) All i, ii, iii, iv and v
10.   A) Tunnel


You may also wanted to view the following related posts

For other more Multiple Choice Questions (MCQs): Click Here

Solved MCQ of Internet Security set-1

Solved MCQ of Internet Security set-1


1. Which of the following are the solutions to network security?
i) Encryption                                       ii) Authentication
iii) Authorization                               iv) Non-repudiation
A) i, ii and iii only
B) ii, iii and iv only
C) i, iii and iv only
D) All i, ii, iii and iv

2. …………… is to protect data and passwords.
A) Encryption
B) Authentication
C) Authorization
D) Non-repudiation


3. The following protocols and system are commonly used to provide various degrees of security services in computer network.
i) IP filtering                                                        ii) Reverse Address Translation
iii) IP security Architecture (IPsec)            iv) Firewalls                        v) Socks
A) i, ii, iii and iv only
B) i, iii, iv and v only
C) ii, iii, iv and v only
D) All i, ii, iii, iv and v

4. A firewall is installed at the point where the secure internal network and untrusted external network meet which is also known as ………………
A) Chock point
B) meeting point
C) firewall point
D) secure point

5. Which of the following is / are the types of firewall?
A) Packet Filtering Firewall
B) Dual Homed Gateway Firewall
C) Screen Host Firewall
D) All of the above

6. The components of IP security includes ………………….
A) Authentication Header (AH)
B) Encapsulating Security Payload (ESP)
C) Internet key Exchange (IKE)
D) All of the above

7. ………………….. is used to carry traffic of one protocol over network that does not support that protocol directly.
A) Tunneling
B) Transferring
C) Trafficking
D) Switching

8. In ………………. Mode, the authentication header is inserted immediately after the IP header.
A) Tunnel
B) Transport
C) Authentication
D) Both A and B

9. State true or false.
i) Socks are a standard for circuit level gateways.
ii) The NAT is used for small number of the hosts in a private network.
A) True, False
B) False, True
C) True, True
D) False, False

10. A ………………. is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection.
A) VNP
B) VPN
C) VSN
D) VSPN
Answers:
1.       D) All i, ii, iii and iv
2.       A) Encryption
3.       B) i, iii, iv and v only
4.       A) Chock point
5.       D) All of the above
6.       D) All of the above
7.       A) Tunneling
8.       A) Tunnel
9.       C) True, True
10.   B) VPN


You may also wanted to view the following related posts

For other more MCQs: Click Here
MCQ of Computer Security with answer set – 2

MCQ of Computer Security with answer set – 2


1. …………….. are used in denial of service attacks, typically against targeted web sites.
A) Worm
B) Zombie
C) Virus
D) Trojan horse

2. Select the correct order for the different phases of virus execution.
i) Propagation phase                      ii) Dormant phase
iii) Execution phase                         iv) Triggering phase
A) i, ii, iii, and iv
B) i, iii, ii and iv
C) ii, i, iv an iii
D) ii, iii, iv and i


3. A ………………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

4. …………………….. is a form of virus explicitly designed to hide itself from detection by antivirus software.
A) Stealth virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

5. A …………………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns.
A) Boot Sector Virus
B) Polymorphic Virus
C) Parasitic Virus
D) Macro Virus

6. A portion of the Polymorphic virus, generally called a …………………….. , creates, a random encryption, key to encrypt the remainder of the virus.
A) mutual engine
B) mutation engine       
C) multiple engine
D) polymorphic engine

7. State whether the following statement is true.
i) A macro virus is platform independent.
ii) Macro viruses infect documents, not executable portions of code.
A) i-only
B) ii-only
C) Both i and ii
D) Non i and ii

8. The type(s) of auto executing macros, in Microsoft word is/are
A) Auto execute
B) Auto macro
C) Command macro
D) All of the above

9. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk.
A) Dormant phase
B) Propagation phase
C) Triggering phase
D) Execution phase

10. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks.
A) Worm
B) Zombie
C) Virus
D) Trap doors
Answers:
1.       B) Zombie
2.       C) ii, i, iv an iii
3.       C) Parasitic Virus
4.       A) Stealth virus
5.       B) Polymorphic Virus
6.       B) mutation engine
7.       C) Both i and ii
8.       D) All of the above
9.       B) Propagation phase
10.   B) Zombie


You may also wanted to view the following related posts

For other more Multiple Choice Questions (MCQs): Click Here