Computer Security and Ethics – Online MCQs Test – Computer Science 9th

Class 9th | Computer Science | Chapter 5 | Computer Security and Ethics | Online MCQs Test

Online MCQs Test of Chapter 5 (Computer Security and Ethics) Computer Science Class 9th Science Group – Sindh Board. According to New Examination Pattern / Syllabus of Sindh Board

1. The malware that replicates itself and doesn’t need to attach with any files is:

 
 
 
 

2. Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called:

 
 
 
 

3. It is one of the largest computer security companies in the world.

 
 
 
 

4. Through which virus spreads?

 
 
 
 

5. The illegal use, copying or distribution of copyrighted software is called:

 
 
 
 

6. Advertising-supported software which presents endless ads and pop-up windows that could potentially consume memory and processing resources is called:

 
 
 
 

7. The crime that is committed though a computer and network.

 
 
 
 

8. It is presenting someone else’s work or ideas as your own without full acknowledgment to the author or conceiver.

 
 
 
 

9. It is done when a cybercriminal uses computer or any device to enter or attacks to other single or multiple computer networks.

 
 
 
 

10. The professional ethics in computer held is important because:

 
 
 
 

11. Since it does not harm or steal data, the least harmful malware is:

 
 
 
 

12. Boot Sector, Resident, and File Infector are some examples of:

 
 
 
 

13. PIN stands for:

 
 
 
 

14. Persons who gain unauthorized access to another system are:

 
 
 
 

15. According to Pakistan’s Cybercrime Law, any offender may be sent to jail for:

 
 
 
 

16. Copying and pasting some texts from internet without acknowledging the real author is an example of:

 
 
 
 

17. It is a method of trying to gather personal information using false e-mails and websites.

 
 
 
 

18. The authentication mechanism that only allows the real person to access data or device is:

 
 
 
 

19. Software are mostly protected under:

 
 
 
 

20. System monitors cookies trackers, rootkits and key-loggers are few examples of:

 
 
 
 


Scroll to Top