Computer Security and Ethics – Online MCQs Test – Computer Science 9th

Class 9th | Computer Science | Chapter 5 | Computer Security and Ethics | Online MCQs Test

Online MCQs Test of Chapter 5 (Computer Security and Ethics) Computer Science Class 9th Science Group – Sindh Board. According to New Examination Pattern / Syllabus of Sindh Board

1. Persons who gain unauthorized access to another system are:

 
 
 
 

2. It is a method of trying to gather personal information using false e-mails and websites.

 
 
 
 

3. System monitors cookies trackers, rootkits and key-loggers are few examples of:

 
 
 
 

4. The crime that is committed though a computer and network.

 
 
 
 

5. The broad term that encompasses different harmful software is:

 
 
 
 

6. A malware that monitors a device and steals important information and sends such information to another person or organization is called:

 
 
 
 

7. It is done when a cybercriminal uses computer or any device to enter or attacks to other single or multiple computer networks.

 
 
 
 

8. Turnitin is a popular service for checking:

 
 
 
 

9. Advertising-supported software which presents endless ads and pop-up windows that could potentially consume memory and processing resources is called:

 
 
 
 

10. According to Pakistan’s Cybercrime Law, any offender may be sent to jail for:

 
 
 
 

11. PIN stands for:

 
 
 
 

12. The illegal use, copying or distribution of copyrighted software is called:

 
 
 
 

13. It is a broad term that encompasses computer viruses, worms, spyware, adware and others that is written generally to cause a mess.

 
 
 
 

14. It is one of the largest computer security companies in the world.

 
 
 
 

15. It is presenting someone else’s work or ideas as your own without full acknowledgment to the author or conceiver.

 
 
 
 

16. Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called:

 
 
 
 

17. “Chick this link and win a $5 voucher at McDonald’s”. This is an example of:

 
 
 
 

18. The authentication mechanism that only allows the real person to access data or device is:

 
 
 
 

19. The malware that replicates itself and doesn’t need to attach with any files is:

 
 
 
 

20. Software are mostly protected under:

 
 
 
 


Scroll to Top