More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
Which is the process of encoding data ?
Choose an answer
Service
Online banking
Client
Encryption
Previous
Skip
Next
Question # 2
Using _______ companies are able to track purchases and gather personal data:
Choose an answer
Data
Infomation
Cookies
Online piracy
Previous
Skip
Next
Question # 3
Cryptographic keys are used to read an ________ message:
Choose an answer
Double
Right
Center
Encrypted
Previous
Skip
Next
Question # 4
In which method, we replace each alphabet in the plaintext by another alphabet:
Choose an answer
Integrity
Cyber
Ceaser Cipher
Privacy
Previous
Skip
Next
Question # 5
Which of the following is not characteristics of phishing website ?
Choose an answer
Similar domain of actual website
Using of forms to collect visitors
Actual link to web account
Email account updates
Previous
Skip
Next
Question # 6
Which attackers often target web server of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations ?
Choose an answer
Service
DoS
Client
Substitution Cipher
Previous
Skip
Next
Question # 7
In this method, we have a substitution key that is combined with the plaintext to generate the ciphertext:
Choose an answer
Vigenere Cipher method
Simple method
Complexmethod
Roundmethod
Previous
Skip
Next
Question # 8
Which is called borrowing and installing a copy of a software application form a colleague ?
Choose an answer
Softlifting
Liability
Denial of service
Online piracy
Previous
Skip
Next
Question # 9
Which means installing and selling unauthorized copies of software on refurbished or new computers ?
Choose an answer
Confidentiality
Privacy
Online Privacy
Hard-disk loading
Previous
Skip
Next
Question # 10
Vigenere Cipher is another substitution cipher, which uses a table known as:
Choose an answer
Vigenere Cipher table
Simple table
Complex table
Round table
Previous
Skip
Next
Question # 11
Which means that we want to keep the data correct ?
Choose an answer
Integrity
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 12
Every organization to whom the data is entrusted, it is their responsibility regarding ___________ of the data:
Choose an answer
Confidentiality
Privacy
Online privacy
Confidentiality and privacy
Previous
Skip
Next
Question # 13
Some software companies sell software with a confidential text, called the:
Choose an answer
Key
Privacy
Software
Phishing
Previous
Skip
Next
Question # 14
Which of the following is not the characteristics of phishing emails ?
Choose an answer
Official data breach notification
Email account update
IT remainder
Similar domain of actual website
Previous
Skip
Next
Question # 15
The computer can be attacked while sitting remotely, in this way sensitive information will be:
Choose an answer
Hacking
Sabotaged
Identity Theft
Decryption
Previous
Skip
Next
Back