1 |
Which of the following doesn't includes the types of software piracy ? |
- A. Softlifting
- B. Liability
- C. Client server oversue
- D. Online piracy
|
2 |
NADRA stands for: |
- A. National Database and Registration Authority
- B. National Database Resolution
- C. Registration Authority
- D. National Drugs Registration
|
3 |
When a key has less number of character than the text to the encrypt, then repeating letters of the key is called: |
- A. Interim ciphertext
- B. Cyber
- C. Client server oversue
- D. Online piracy
|
4 |
Which are used for authentication to enter a system ? |
- A. Hacking
- B. Sabotaged
- C. Passwords
- D. Decryption
|
5 |
Which is a general term for any type of information processing that can be represented mathematically ? |
- A. Computation
- B. Liability
- C. Client server oversue
- D. Online piracy
|
6 |
Which is called borrowing and installing a copy of a software application form a colleague ? |
- A. <sub>Softlifting</sub>
- B. Liability
- C. Denial of service
- D. Online piracy
|
7 |
Making illegal copies of software is called: |
- A. Stolen
- B. Phishing crime
- C. Identity Theft
- D. Piracy
|
8 |
Cryptographic keys are used to read an ________ message: |
- A. Double
- B. Right
- C. Center
- D. Encrypted
|
9 |
Which is used to read the ciphertext ? |
- A. Key
- B. Board
- C. Mouse
- D. Trackball
|
10 |
Which means installing and selling unauthorized copies of software on refurbished or new computers ? |
- A. Confidentiality
- B. Privacy
- C. Online Privacy
- D. Hard-disk loading
|