More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
Which is a general term for any type of information processing that can be represented mathematically ?
Choose an answer
Computation
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 2
Every organization to whom the data is entrusted, it is their responsibility regarding ___________ of the data:
Choose an answer
Confidentiality
Privacy
Online privacy
Confidentiality and privacy
Previous
Skip
Next
Question # 3
A _________ is a computer program written with negative intentions:
Choose an answer
Patent
Virus
Client
Software piracy
Previous
Skip
Next
Question # 4
CAPTCHA stands for:
Choose an answer
Completely Automated Public Turning
Completely Automated
Automated Public Turning
Automated
Previous
Skip
Next
Question # 5
Which of the following is not a characteristic of good password ?
Choose an answer
Is eight characters long
Doesn't contain username
Contains uppercase letters
Password is your name only
Previous
Skip
Next
Question # 6
Which can protect and idea so that it won't be misuse and the owner will attain its full rights ?
Choose an answer
Hacking
Patent
Identity Theft
Decryption
Previous
Skip
Next
Question # 7
In which method, we replace each alphabet in the plaintext by another alphabet:
Choose an answer
Integrity
Cyber
Ceaser Cipher
Privacy
Previous
Skip
Next
Question # 8
Ceaser was a Roman politician and military general who played a critical role in the rise of the:
Choose an answer
Asia Empire
Roman Empire
American Empire
Pakistan Empire
Previous
Skip
Next
Question # 9
The foundation of all security systems is formed on:
Choose an answer
Ethical principles
Formal principles
Principles
Outline
Previous
Skip
Next
Question # 10
NADRA stands for:
Choose an answer
National Database and Registration Authority
National Database Resolution
Registration Authority
National Drugs Registration
Previous
Skip
Next
Question # 11
Some malicious user disguises himself as our friend and tries to get some confidential information:
Choose an answer
Lefting
Phishing
Identity Theft
Online piracy
Previous
Skip
Next
Question # 12
Which methods are the methods of encryption in which the characters of original text are replaced by some other characters ?
Choose an answer
Service
Counterfeiting
Client
Substitution Cipher
Previous
Skip
Next
Question # 13
Making illegal copies of software is called:
Choose an answer
Stolen
Phishing crime
Identity Theft
Piracy
Previous
Skip
Next
Question # 14
Using _______ companies are able to track purchases and gather personal data:
Choose an answer
Data
Infomation
Cookies
Online piracy
Previous
Skip
Next
Question # 15
Which is installing more copies of the software than you have license for ?
Choose an answer
Internet cyber text
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Back