Bibek Baniya | Questions Bibek Baniya594 QuestionsAnswersReputations 0 Votes 1 Ans what is the full form of RAM ? 89 viewsAman Sharma Answered question January 25, 2025Bookscomputer 0 Votes 0 Ans How does ransomware work, and why has it become a growing threat in recent years? 54 viewsBibek Baniya Asked question January 25, 2025Cybersecuritycybercrime 0 Votes 0 Ans What are the consequences for organizations that fail to secure customer data against cyberattacks? 44 viewsBibek Baniya Asked question January 25, 2025Cybersecuritycybercrime 0 Votes 0 Ans What role do ethical hackers play in combating cybercrime? 53 viewsBibek Baniya Asked question January 25, 2025Cybersecuritycybercrime 0 Votes 0 Ans How can individuals protect themselves from phishing scams and identity theft? 50 viewsBibek Baniya Asked question January 25, 2025Cybersecuritycybercrime 0 Votes 0 Ans What are some of the most common types of cybercrimes people fall victim to today? 52 viewsBibek Baniya Asked question January 25, 2025Cybersecuritycybercrime 0 Votes 1 Ans If you could have any animal (real or mythical) as a pet, what would it be and why? 81 viewsRojan Adhikari Answered question January 23, 2025Othersdream 0 Votes 1 Ans Who is your favorite author? 74 viewsRojan Adhikari Answered question January 23, 2025Booksbooks 1 Votes 1 Ans What’s your favorite book of all time? 76 viewsRojan Adhikari Answered question January 23, 2025Booksbest books 0 Votes 1 Ans What book are you currently reading? 78 viewsRojan Adhikari Answered question January 23, 2025Booksgood books 0 Votes 0 Ans What’s the last book that made you cry or laugh out loud? 56 viewsBibek Baniya Asked question January 21, 2025Booksgood books 0 Votes 0 Ans what is the full form of IBM ? 62 viewsBibek Baniya Asked question January 20, 2025Bookscomputer 0 Votes 0 Ans what is the full form of ROM ? 62 viewsBibek Baniya Asked question January 20, 2025Bookscomputer 1 Votes 1 Ans What is the purpose of the static keyword in Java? 86 viewspraxantp Answered question January 19, 2025Othersjava 1 Votes 1 Ans Why is it risky to use public Wi-Fi, and how can you stay safe when using it? 97 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is the purpose of encrypting sensitive data, and how does it work? 97 viewspraxantp Answered question January 19, 2025CybersecurityCyber Security 1 Votes 1 Ans What is a firewall, and how does it help protect your devices? 93 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is social engineering, and how do cybercriminals use it to trick people? 83 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 0 Votes 0 Ans What is the acceleration due to gravity on Earth? 59 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the formula for calculating kinetic energy? 58 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the unit of force in the SI system? 60 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is Newton’s First Law of Motion? 64 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the speed of light in a vacuum? 64 viewsBibek Baniya Asked question January 19, 2025Booksphysics 0 Votes 0 Ans What is the difference between abstract class and interface in Java? 59 viewsBibek Baniya Asked question January 18, 2025Othersjava 0 Votes 0 Ans What is the difference between JDK and JRE in Java? 56 viewsBibek Baniya Asked question January 18, 2025Othersjava 0 Votes 0 Ans What is the role of an antivirus program, and how often should you scan your devices? 73 viewsBibek Baniya Asked question January 17, 2025CybersecurityCyber Security 0 Votes 0 Ans How can you spot a fake or malicious website designed to steal your information? 147 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans What should you do if you suspect your personal data has been leaked in a data breach? 72 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans How can you safely dispose of an old computer or smartphone without exposing your personal data? 85 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the principle of least privilege, and how does it enhance security in a network? 76 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are the key differences between a virus, a worm, and a Trojan horse in malware? 75 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are zero-day vulnerabilities, and why are they particularly dangerous for organizations? 63 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is ransomware, and what steps can organizations take to defend against ransomware attacks? 67 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the difference between symmetric and asymmetric encryption? 68 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 1 Ans Is it important to set difficult password ? 100 viewsKrishna Poudel Answered question January 15, 2025Cybersecuritycybersecurity 0 Votes 0 Ans what is phishing ? 71 viewsBibek Baniya Asked question January 15, 2025Cybersecuritycybersecurity 0 Votes 0 Ans what is cyber security ? 77 viewsBibek Baniya Asked question January 15, 2025CybersecurityCyber Security website security