More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
9th Class Computer Chapter 4 Data Communication English Medium KPK Boards Online Mcqs MCQs With Answers
Question # 1
A crime in which computer network or devices are used is called a:
Choose an answer
Lefting
Phishing crime
Identity Theft
Cybercrime
Previous
Skip
Next
Question # 2
Which is a way to protect an idea ?
Choose an answer
Patent
Online banking
Client
Software piracy
Previous
Skip
Next
Question # 3
CAPTCHA stands for:
Choose an answer
Completely Automated Public Turning
Completely Automated
Automated Public Turning
Automated
Previous
Skip
Next
Question # 4
Which are used for authentication to enter a system ?
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 5
Ceaser was a Roman politician and military general who played a critical role in the rise of the:
Choose an answer
Asia Empire
Roman Empire
American Empire
Pakistan Empire
Previous
Skip
Next
Question # 6
Which is a cyber attack to make machine or network resource unavailable for a user ?
Choose an answer
Softlifting
Liability
Denial of service
Online piracy
Previous
Skip
Next
Question # 7
Some malicious user disguises himself as our friend and tries to get some confidential information:
Choose an answer
Lefting
Phishing
Identity Theft
Online piracy
Previous
Skip
Next
Question # 8
Which is called borrowing and installing a copy of a software application form a colleague ?
Choose an answer
Softlifting
Liability
Denial of service
Online piracy
Previous
Skip
Next
Question # 9
Making illegal copies of software is called:
Choose an answer
Stolen
Phishing crime
Identity Theft
Piracy
Previous
Skip
Next
Question # 10
Using _______ companies are able to track purchases and gather personal data:
Choose an answer
Data
Infomation
Cookies
Online piracy
Previous
Skip
Next
Question # 11
When a key has less number of character than the text to the encrypt, then repeating letters of the key is called:
Choose an answer
Interim ciphertext
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Question # 12
Which of the following is not a cybercrime ?
Choose an answer
Hacking
Phishing crime
Identity Theft
Decryption
Previous
Skip
Next
Question # 13
In Roman Empire _______ method is used this method of encryption for sending messages to his soldiers and generals:
Choose an answer
Service
Online banking
Client
Ceaser
Previous
Skip
Next
Question # 14
In this method, we have a substitution key that is combined with the plaintext to generate the ciphertext:
Choose an answer
Vigenere Cipher method
Simple method
Complexmethod
Roundmethod
Previous
Skip
Next
Question # 15
Which is a serious attack on a computer system ?
Choose an answer
Hacking
Sabotage
Passwords
Decryption
Previous
Skip
Next
Question # 16
Which is the process of encoding data ?
Choose an answer
Service
Online banking
Client
Encryption
Previous
Skip
Next
Question # 17
Which is called duplicating and selling copyrighted programs ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 18
Which is the process of encoding data in such a way that only authorized person can read it ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 19
A _________ is a computer program written with negative intentions:
Choose an answer
Patent
Virus
Client
Software piracy
Previous
Skip
Next
Question # 20
Which is installing more copies of the software than you have license for ?
Choose an answer
Internet cyber text
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Question # 21
Which means that we want to keep the data correct ?
Choose an answer
Integrity
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Back