More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
9th Class Computer Chapter 4 Data Communication English Medium KPK Boards Online Mcqs MCQs With Answers
Question # 1
Using computer for the purpose of some unauthorized activities is called:
Choose an answer
Fraud or misuse
Selling and printing
Denial of service
Piracy
Previous
Skip
Next
Question # 2
When a key has less number of character than the text to the encrypt, then repeating letters of the key is called:
Choose an answer
Interim ciphertext
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Question # 3
In which method, we replace each alphabet in the plaintext by another alphabet:
Choose an answer
Integrity
Cyber
Ceaser Cipher
Privacy
Previous
Skip
Next
Question # 4
A computer expert who can steal data when it moves from on location to other, is called:
Choose an answer
Hacker
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 5
Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web surfer, called:
Choose an answer
Integrity
Cyber
Cookies
Online piracy
Previous
Skip
Next
Question # 6
CAPTCHA stands for:
Choose an answer
Completely Automated Public Turning
Completely Automated
Automated Public Turning
Automated
Previous
Skip
Next
Question # 7
Which can protect and idea so that it won't be misuse and the owner will attain its full rights ?
Choose an answer
Hacking
Patent
Identity Theft
Decryption
Previous
Skip
Next
Question # 8
Which is called duplicating and selling copyrighted programs ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 9
Which attackers often target web server of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations ?
Choose an answer
Service
DoS
Client
Substitution Cipher
Previous
Skip
Next
Question # 10
To protect value and usefulness we may imply:
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 11
Vigenere Cipher is another substitution cipher, which uses a table known as:
Choose an answer
Vigenere Cipher table
Simple table
Complex table
Round table
Previous
Skip
Next
Question # 12
NADRA stands for:
Choose an answer
National Database and Registration Authority
National Database Resolution
Registration Authority
National Drugs Registration
Previous
Skip
Next
Question # 13
Which is used to read the ciphertext ?
Choose an answer
Key
Board
Mouse
Trackball
Previous
Skip
Next
Question # 14
Which is the process of encoding data ?
Choose an answer
Service
Online banking
Client
Encryption
Previous
Skip
Next
Question # 15
The foundation of all security systems is formed on:
Choose an answer
Ethical principles
Formal principles
Principles
Outline
Previous
Skip
Next
Question # 16
Which is the process of encoding data in such a way that only authorized person can read it ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 17
A crime in which computer network or devices are used is called a:
Choose an answer
Lefting
Phishing crime
Identity Theft
Cybercrime
Previous
Skip
Next
Question # 18
Which is a general term for any type of information processing that can be represented mathematically ?
Choose an answer
Computation
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 19
Which is the illegal copying, distribution, or usage of software ?
Choose an answer
Service
Online banking
Client
Software piracy
Previous
Skip
Next
Question # 20
Illegally accessing someone else's computer is called:
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 21
Typically involves downloading illegal software:
Choose an answer
Lefting
Phishing crime
Identity Theft
Online piracy
Previous
Skip
Next
Back