Computer Security and Ethics – Online MCQs Test – Computer Science 9th

Class 9th | Computer Science | Chapter 5 | Computer Security and Ethics | Online MCQs Test

Online MCQs Test of Chapter 5 (Computer Security and Ethics) Computer Science Class 9th Science Group – Sindh Board. According to New Examination Pattern / Syllabus of Sindh Board

1. Boot Sector, Resident, and File Infector are some examples of:

 
 
 
 

2. The professional ethics in computer held is important because:

 
 
 
 

3. Free Antivirus Software often:

 
 
 
 

4. Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called:

 
 
 
 

5. System monitors cookies trackers, rootkits and key-loggers are few examples of:

 
 
 
 

6. The malware that replicates itself and doesn’t need to attach with any files is:

 
 
 
 

7. Since it does not harm or steal data, the least harmful malware is:

 
 
 
 

8. It is one of the largest computer security companies in the world.

 
 
 
 

9. Copying and pasting some texts from internet without acknowledging the real author is an example of:

 
 
 
 

10. It is a method of trying to gather personal information using false e-mails and websites.

 
 
 
 

11. The illegal use, copying or distribution of copyrighted software is called:

 
 
 
 

12. Through which virus spreads?

 
 
 
 

13. The authentication mechanism that only allows the real person to access data or device is:

 
 
 
 

14. Software are mostly protected under:

 
 
 
 

15. It is a broad term that encompasses computer viruses, worms, spyware, adware and others that is written generally to cause a mess.

 
 
 
 

16. Advertising-supported software which presents endless ads and pop-up windows that could potentially consume memory and processing resources is called:

 
 
 
 

17. A malware that monitors a device and steals important information and sends such information to another person or organization is called:

 
 
 
 

18. Hacker uses his or her skills to identify and overcome a network:

 
 
 
 

19. “Chick this link and win a $5 voucher at McDonald’s”. This is an example of:

 
 
 
 

20. Turnitin is a popular service for checking:

 
 
 
 


Scroll to Top