More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
9th Class Computer Chapter 4 Data Communication English Medium KPK Boards Online Mcqs MCQs With Answers
Question # 1
Vigenere Cipher is another substitution cipher, which uses a table known as:
Choose an answer
Vigenere Cipher table
Simple table
Complex table
Round table
Previous
Skip
Next
Question # 2
The computer can be attacked while sitting remotely, in this way sensitive information will be:
Choose an answer
Hacking
Sabotaged
Identity Theft
Decryption
Previous
Skip
Next
Question # 3
Which of the following is not characteristics of phishing website ?
Choose an answer
Similar domain of actual website
Using of forms to collect visitors
Actual link to web account
Email account updates
Previous
Skip
Next
Question # 4
Illegally accessing someone else's computer is called:
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 5
NADRA stands for:
Choose an answer
National Database and Registration Authority
National Database Resolution
Registration Authority
National Drugs Registration
Previous
Skip
Next
Question # 6
In Roman Empire _______ method is used this method of encryption for sending messages to his soldiers and generals:
Choose an answer
Service
Online banking
Client
Ceaser
Previous
Skip
Next
Question # 7
Which means that we want to have access to the data when we want ?
Choose an answer
Patent
Availibility
Client
Software piracy
Previous
Skip
Next
Question # 8
Some malicious user disguises himself as our friend and tries to get some confidential information:
Choose an answer
Lefting
Phishing
Identity Theft
Online piracy
Previous
Skip
Next
Question # 9
Making illegal copies of software is called:
Choose an answer
Stolen
Phishing crime
Identity Theft
Piracy
Previous
Skip
Next
Question # 10
Which methods are the methods of encryption in which the characters of original text are replaced by some other characters ?
Choose an answer
Service
Counterfeiting
Client
Substitution Cipher
Previous
Skip
Next
Question # 11
CAPTCHA stands for:
Choose an answer
Completely Automated Public Turning
Completely Automated
Automated Public Turning
Automated
Previous
Skip
Next
Question # 12
Which of the following doesn't includes the types of software piracy ?
Choose an answer
Softlifting
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 13
To protect value and usefulness we may imply:
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 14
Promises made by a software developer is known as warranty or:
Choose an answer
Confidentiality
Service
Liability
Loading
Previous
Skip
Next
Question # 15
Which are used for authentication to enter a system ?
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Back