Computer Security and Ethics – Online MCQs Test – Computer Science 9th

Class 9th | Computer Science | Chapter # 5 | Computer Security and Ethics | Online MCQs Test

Computer Security and Ethics – Online MCQs Test – Computer Science 9th Notes – Sindh Board

0%

You have 14 minutes to complete the test consist of 27 Questions

Your time has been finished!


Chap 5 - Computer Security and Ethics - Computer Science 9th

Science Group - Sindh Board

1 / 27

1. "Chick this link and win a $5 voucher at McDonald's". This is an example of:

2 / 27

2. The illegal use, copying or distribution of copyrighted software is called:

3 / 27

3. It is a broad term that encompasses computer viruses, worms, spyware, adware and others that is written generally to cause a mess.

4 / 27

4. PIN stands for:

5 / 27

5. Advertising-supported software which presents endless ads and pop-up windows that could potentially consume memory and processing resources is called:

6 / 27

6. The broad term that encompasses different harmful software is:

7 / 27

7. Software are mostly protected under:

8 / 27

8. System monitors cookies trackers, rootkits and key-loggers are few examples of:

9 / 27

9. Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called:

10 / 27

10. The malware that replicates itself and doesn't need to attach with any files is:

11 / 27

11. Turnitin is a popular service for checking:

12 / 27

12. It is presenting someone else's work or ideas as your own without full acknowledgment to the author or conceiver.

13 / 27

13. A malware that monitors a device and steals important information and sends such information to another person or organization is called:

14 / 27

14. Through which virus spreads?

15 / 27

15. Hacker uses his or her skills to identify and overcome a network:

16 / 27

16. It is done when a cyber criminal uses computer or any device to enter or attacks to other single or multiple computer networks.

17 / 27

17. Persons who gain unauthorized access to another system are:

18 / 27

18. Copying and pasting some texts from internet without acknowledging the real author is an example of:

19 / 27

19. Free Antivirus Software often:

20 / 27

20. According to Pakistan's Cybercrime Law, any offender may be sent to jail for:

21 / 27

21. It is a method of trying to gather personal information using false e-mails and websites.

22 / 27

22. The crime that is committed though a computer and network.

23 / 27

23. The professional ethics in computer held is important because:

24 / 27

24. It is one of the largest computer security companies in the world.

25 / 27

25. The authentication mechanism that only allows the real person to access data or device is:

26 / 27

26. Since it does not harm or steal data, the least harmful malware is:

27 / 27

27. Boot Sector, Resident, and File Infector are some examples of:

Your score is

The average score is 21%

0%

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *