More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
To protect value and usefulness we may imply:
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 2
A crime in which computer network or devices are used is called a:
Choose an answer
Lefting
Phishing crime
Identity Theft
Cybercrime
Previous
Skip
Next
Question # 3
The computer can be attacked while sitting remotely, in this way sensitive information will be:
Choose an answer
Hacking
Sabotaged
Identity Theft
Decryption
Previous
Skip
Next
Question # 4
Which are usually the secrets that are playing an important role for the success of a company ?
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 5
Which of the following is not a cybercrime ?
Choose an answer
Hacking
Phishing crime
Identity Theft
Decryption
Previous
Skip
Next
Question # 6
Which of the following doesn't includes the types of software piracy ?
Choose an answer
Softlifting
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 7
Encoding means conversion of the data to an unreadable format which is called:
Choose an answer
Ciphertext
Online banking
Client
Encryption
Previous
Skip
Next
Question # 8
Which is a serious attack on a computer system ?
Choose an answer
Hacking
Sabotage
Passwords
Decryption
Previous
Skip
Next
Question # 9
CAPTCHA stands for:
Choose an answer
Completely Automated Public Turning
Completely Automated
Automated Public Turning
Automated
Previous
Skip
Next
Question # 10
Ceaser was a Roman politician and military general who played a critical role in the rise of the:
Choose an answer
Asia Empire
Roman Empire
American Empire
Pakistan Empire
Previous
Skip
Next
Question # 11
Which is called duplicating and selling copyrighted programs ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 12
Which are used for authentication to enter a system ?
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 13
Cryptographic keys are used to read an ________ message:
Choose an answer
Double
Right
Center
Encrypted
Previous
Skip
Next
Back