More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
The computer can be attacked while sitting remotely, in this way sensitive information will be:
Choose an answer
Hacking
Sabotaged
Identity Theft
Decryption
Previous
Skip
Next
Question # 2
Which means that we want to have access to the data when we want ?
Choose an answer
Patent
Availibility
Client
Software piracy
Previous
Skip
Next
Question # 3
Which of the following is not characteristics of phishing website ?
Choose an answer
Similar domain of actual website
Using of forms to collect visitors
Actual link to web account
Email account updates
Previous
Skip
Next
Question # 4
In which method, we replace each alphabet in the plaintext by another alphabet:
Choose an answer
Integrity
Cyber
Ceaser Cipher
Privacy
Previous
Skip
Next
Question # 5
Cryptographic keys are used to read an ________ message:
Choose an answer
Double
Right
Center
Encrypted
Previous
Skip
Next
Question # 6
Every organization to whom the data is entrusted, it is their responsibility regarding ___________ of the data:
Choose an answer
Confidentiality
Privacy
Online privacy
Confidentiality and privacy
Previous
Skip
Next
Question # 7
Ceaser was a Roman politician and military general who played a critical role in the rise of the:
Choose an answer
Asia Empire
Roman Empire
American Empire
Pakistan Empire
Previous
Skip
Next
Question # 8
Encoding means conversion of the data to an unreadable format which is called:
Choose an answer
Ciphertext
Online banking
Client
Encryption
Previous
Skip
Next
Question # 9
Which is used to read the ciphertext ?
Choose an answer
Key
Board
Mouse
Trackball
Previous
Skip
Next
Question # 10
The foundation of all security systems is formed on:
Choose an answer
Ethical principles
Formal principles
Principles
Outline
Previous
Skip
Next
Question # 11
Typically involves downloading illegal software:
Choose an answer
Lefting
Phishing crime
Identity Theft
Online piracy
Previous
Skip
Next
Question # 12
Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web surfer, called:
Choose an answer
Integrity
Cyber
Cookies
Online piracy
Previous
Skip
Next
Question # 13
Some malicious user disguises himself as our friend and tries to get some confidential information:
Choose an answer
Lefting
Phishing
Identity Theft
Online piracy
Previous
Skip
Next
Question # 14
Which means that we want to keep the data correct ?
Choose an answer
Integrity
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 15
Which of the following is not a characteristic of good password ?
Choose an answer
Is eight characters long
Doesn't contain username
Contains uppercase letters
Password is your name only
Previous
Skip
Next
Back