Bibek Baniya | Questions Bibek Baniya594 QuestionsAnswersReputations 0 Votes 1 Ans what is the full form of RAM ? 39 viewsAman Sharma Answered question 5 days agoBookscomputer 0 Votes 0 Ans How does ransomware work, and why has it become a growing threat in recent years? 9 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans What are the consequences for organizations that fail to secure customer data against cyberattacks? 8 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans What role do ethical hackers play in combating cybercrime? 9 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans How can individuals protect themselves from phishing scams and identity theft? 8 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans What are some of the most common types of cybercrimes people fall victim to today? 9 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 1 Ans If you could have any animal (real or mythical) as a pet, what would it be and why? 32 viewsRojan Adhikari Answered question January 23, 2025Othersdream 0 Votes 1 Ans Who is your favorite author? 32 viewsRojan Adhikari Answered question January 23, 2025Booksbooks 1 Votes 1 Ans What’s your favorite book of all time? 30 viewsRojan Adhikari Answered question January 23, 2025Booksbest books 0 Votes 1 Ans What book are you currently reading? 30 viewsRojan Adhikari Answered question January 23, 2025Booksgood books 0 Votes 0 Ans What’s the last book that made you cry or laugh out loud? 24 viewsBibek Baniya Asked question January 21, 2025Booksgood books 0 Votes 0 Ans what is the full form of IBM ? 28 viewsBibek Baniya Asked question January 20, 2025Bookscomputer 0 Votes 0 Ans what is the full form of ROM ? 27 viewsBibek Baniya Asked question January 20, 2025Bookscomputer 1 Votes 1 Ans What is the purpose of the static keyword in Java? 38 viewspraxantp Answered question January 19, 2025Othersjava 1 Votes 1 Ans Why is it risky to use public Wi-Fi, and how can you stay safe when using it? 47 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is the purpose of encrypting sensitive data, and how does it work? 41 viewspraxantp Answered question January 19, 2025CybersecurityCyber Security 1 Votes 1 Ans What is a firewall, and how does it help protect your devices? 40 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is social engineering, and how do cybercriminals use it to trick people? 40 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 0 Votes 0 Ans What is the acceleration due to gravity on Earth? 27 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the formula for calculating kinetic energy? 25 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the unit of force in the SI system? 23 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is Newton’s First Law of Motion? 26 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the speed of light in a vacuum? 26 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the difference between abstract class and interface in Java? 31 viewsBibek Baniya Asked question January 18, 2025Othersjava 0 Votes 0 Ans What is the difference between JDK and JRE in Java? 28 viewsBibek Baniya Asked question January 18, 2025Othersjava 0 Votes 0 Ans What is the role of an antivirus program, and how often should you scan your devices? 36 viewsBibek Baniya Asked question January 17, 2025CybersecurityCyber Security 0 Votes 0 Ans How can you spot a fake or malicious website designed to steal your information? 77 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans What should you do if you suspect your personal data has been leaked in a data breach? 32 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans How can you safely dispose of an old computer or smartphone without exposing your personal data? 38 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the principle of least privilege, and how does it enhance security in a network? 41 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are the key differences between a virus, a worm, and a Trojan horse in malware? 40 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are zero-day vulnerabilities, and why are they particularly dangerous for organizations? 34 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is ransomware, and what steps can organizations take to defend against ransomware attacks? 38 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the difference between symmetric and asymmetric encryption? 34 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 1 Ans Is it important to set difficult password ? 50 viewsKrishna Poudel Answered question January 15, 2025Cybersecuritycybersecurity 0 Votes 0 Ans what is phishing ? 31 viewsBibek Baniya Asked question January 15, 2025Cybersecuritycybersecurity 0 Votes 0 Ans what is cyber security ? 33 viewsBibek Baniya Asked question January 15, 2025CybersecurityCyber Security website security