More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
Which means installing and selling unauthorized copies of software on refurbished or new computers ?
Choose an answer
Confidentiality
Privacy
Online Privacy
Hard-disk loading
Previous
Skip
Next
Question # 2
The foundation of all security systems is formed on:
Choose an answer
Ethical principles
Formal principles
Principles
Outline
Previous
Skip
Next
Question # 3
Which of the following is not a cybercrime ?
Choose an answer
Hacking
Phishing crime
Identity Theft
Decryption
Previous
Skip
Next
Question # 4
Which are used for authentication to enter a system ?
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 5
Which is called borrowing and installing a copy of a software application form a colleague ?
Choose an answer
Softlifting
Liability
Denial of service
Online piracy
Previous
Skip
Next
Question # 6
Which means that we want to have access to the data when we want ?
Choose an answer
Patent
Availibility
Client
Software piracy
Previous
Skip
Next
Question # 7
A _________ is a computer program written with negative intentions:
Choose an answer
Patent
Virus
Client
Software piracy
Previous
Skip
Next
Question # 8
Some software companies sell software with a confidential text, called the:
Choose an answer
Key
Privacy
Software
Phishing
Previous
Skip
Next
Question # 9
Some malicious user disguises himself as our friend and tries to get some confidential information:
Choose an answer
Lefting
Phishing
Identity Theft
Online piracy
Previous
Skip
Next
Question # 10
Typically involves downloading illegal software:
Choose an answer
Lefting
Phishing crime
Identity Theft
Online piracy
Previous
Skip
Next
Question # 11
In this method, we have a substitution key that is combined with the plaintext to generate the ciphertext:
Choose an answer
Vigenere Cipher method
Simple method
Complexmethod
Roundmethod
Previous
Skip
Next
Question # 12
Which can protect and idea so that it won't be misuse and the owner will attain its full rights ?
Choose an answer
Hacking
Patent
Identity Theft
Decryption
Previous
Skip
Next
Question # 13
In which method, we replace each alphabet in the plaintext by another alphabet:
Choose an answer
Integrity
Cyber
Ceaser Cipher
Privacy
Previous
Skip
Next
Back