Computer Security and Ethics – Online MCQs Test – Computer Science 9th

Class 9th | Computer Science | Chapter 5 | Computer Security and Ethics | Online MCQs Test

Online MCQs Test of Chapter 5 (Computer Security and Ethics) Computer Science Class 9th Science Group – Sindh Board. According to New Examination Pattern / Syllabus of Sindh Board

1. It is a broad term that encompasses computer viruses, worms, spyware, adware and others that is written generally to cause a mess.

 
 
 
 

2. Through which virus spreads?

 
 
 
 

3. The illegal use, copying or distribution of copyrighted software is called:

 
 
 
 

4. Turnitin is a popular service for checking:

 
 
 
 

5. System monitors cookies trackers, rootkits and key-loggers are few examples of:

 
 
 
 

6. Copying and pasting some texts from internet without acknowledging the real author is an example of:

 
 
 
 

7. Software are mostly protected under:

 
 
 
 

8. The broad term that encompasses different harmful software is:

 
 
 
 

9. The crime that is committed though a computer and network.

 
 
 
 

10. Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called:

 
 
 
 

11. A malware that monitors a device and steals important information and sends such information to another person or organization is called:

 
 
 
 

12. According to Pakistan’s Cybercrime Law, any offender may be sent to jail for:

 
 
 
 

13. It is presenting someone else’s work or ideas as your own without full acknowledgment to the author or conceiver.

 
 
 
 

14. Hacker uses his or her skills to identify and overcome a network:

 
 
 
 

15. It is done when a cybercriminal uses computer or any device to enter or attacks to other single or multiple computer networks.

 
 
 
 

16. It is a method of trying to gather personal information using false e-mails and websites.

 
 
 
 

17. Persons who gain unauthorized access to another system are:

 
 
 
 

18. Boot Sector, Resident, and File Infector are some examples of:

 
 
 
 

19. Advertising-supported software which presents endless ads and pop-up windows that could potentially consume memory and processing resources is called:

 
 
 
 

20. Since it does not harm or steal data, the least harmful malware is:

 
 
 
 


Scroll to Top