More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
9th Class Computer Chapter 4 Data Communication English Medium KPK Boards Online Mcqs MCQs With Answers
Question # 1
In Roman Empire _______ method is used this method of encryption for sending messages to his soldiers and generals:
Choose an answer
Service
Online banking
Client
Ceaser
Previous
Skip
Next
Question # 2
Which of the following is not a characteristic of good password ?
Choose an answer
Is eight characters long
Doesn't contain username
Contains uppercase letters
Password is your name only
Previous
Skip
Next
Question # 3
Which is the process of encoding data ?
Choose an answer
Service
Online banking
Client
Encryption
Previous
Skip
Next
Question # 4
NADRA stands for:
Choose an answer
National Database and Registration Authority
National Database Resolution
Registration Authority
National Drugs Registration
Previous
Skip
Next
Question # 5
Which of the following is not the characteristics of phishing emails ?
Choose an answer
Official data breach notification
Email account update
IT remainder
Similar domain of actual website
Previous
Skip
Next
Question # 6
Illegally accessing someone else's computer is called:
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 7
Which is installing more copies of the software than you have license for ?
Choose an answer
Internet cyber text
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Question # 8
Which is a general term for any type of information processing that can be represented mathematically ?
Choose an answer
Computation
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 9
When a key has less number of character than the text to the encrypt, then repeating letters of the key is called:
Choose an answer
Interim ciphertext
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Question # 10
Which is used to read the ciphertext ?
Choose an answer
Key
Board
Mouse
Trackball
Previous
Skip
Next
Question # 11
In which method, we replace each alphabet in the plaintext by another alphabet:
Choose an answer
Integrity
Cyber
Ceaser Cipher
Privacy
Previous
Skip
Next
Question # 12
Which means that we want to have access to the data when we want ?
Choose an answer
Patent
Availibility
Client
Software piracy
Previous
Skip
Next
Question # 13
Which means that we want to keep the data correct ?
Choose an answer
Integrity
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 14
The foundation of all security systems is formed on:
Choose an answer
Ethical principles
Formal principles
Principles
Outline
Previous
Skip
Next
Question # 15
Which is the illegal copying, distribution, or usage of software ?
Choose an answer
Service
Online banking
Client
Software piracy
Previous
Skip
Next
Back