More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
9th Class Computer Chapter 4 Data Communication English Medium KPK Boards Online Mcqs MCQs With Answers
Question # 1
Every organization to whom the data is entrusted, it is their responsibility regarding ___________ of the data:
Choose an answer
Confidentiality
Privacy
Online privacy
Confidentiality and privacy
Previous
Skip
Next
Question # 2
Which is the illegal copying, distribution, or usage of software ?
Choose an answer
Service
Online banking
Client
Software piracy
Previous
Skip
Next
Question # 3
Which is a way to protect an idea ?
Choose an answer
Patent
Online banking
Client
Software piracy
Previous
Skip
Next
Question # 4
Which is called duplicating and selling copyrighted programs ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 5
To protect value and usefulness we may imply:
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 6
Which is used to read the ciphertext ?
Choose an answer
Key
Board
Mouse
Trackball
Previous
Skip
Next
Question # 7
Which attackers often target web server of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations ?
Choose an answer
Service
DoS
Client
Substitution Cipher
Previous
Skip
Next
Question # 8
Which of the following doesn't includes the types of software piracy ?
Choose an answer
Softlifting
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 9
Which is called borrowing and installing a copy of a software application form a colleague ?
Choose an answer
Softlifting
Liability
Denial of service
Online piracy
Previous
Skip
Next
Question # 10
In Roman Empire _______ method is used this method of encryption for sending messages to his soldiers and generals:
Choose an answer
Service
Online banking
Client
Ceaser
Previous
Skip
Next
Question # 11
Which means that we want to have access to the data when we want ?
Choose an answer
Patent
Availibility
Client
Software piracy
Previous
Skip
Next
Question # 12
In which method, we replace each alphabet in the plaintext by another alphabet:
Choose an answer
Integrity
Cyber
Ceaser Cipher
Privacy
Previous
Skip
Next
Question # 13
Which is the process of encoding data in such a way that only authorized person can read it ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 14
Which is a serious attack on a computer system ?
Choose an answer
Hacking
Sabotage
Passwords
Decryption
Previous
Skip
Next
Question # 15
Which is the process of encoding data ?
Choose an answer
Service
Online banking
Client
Encryption
Previous
Skip
Next
Back