More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
Typically involves downloading illegal software:
Choose an answer
Lefting
Phishing crime
Identity Theft
Online piracy
Previous
Skip
Next
Question # 2
Which of the following doesn't includes the types of software piracy ?
Choose an answer
Softlifting
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 3
A computer expert who can steal data when it moves from on location to other, is called:
Choose an answer
Hacker
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 4
Which is the process of encoding data in such a way that only authorized person can read it ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 5
In Roman Empire _______ method is used this method of encryption for sending messages to his soldiers and generals:
Choose an answer
Service
Online banking
Client
Ceaser
Previous
Skip
Next
Question # 6
Which can protect and idea so that it won't be misuse and the owner will attain its full rights ?
Choose an answer
Hacking
Patent
Identity Theft
Decryption
Previous
Skip
Next
Question # 7
Some malicious user disguises himself as our friend and tries to get some confidential information:
Choose an answer
Lefting
Phishing
Identity Theft
Online piracy
Previous
Skip
Next
Question # 8
Using computer for the purpose of some unauthorized activities is called:
Choose an answer
Fraud or misuse
Selling and printing
Denial of service
Piracy
Previous
Skip
Next
Question # 9
Which of the following is not a characteristic of good password ?
Choose an answer
Is eight characters long
Doesn't contain username
Contains uppercase letters
Password is your name only
Previous
Skip
Next
Question # 10
Promises made by a software developer is known as warranty or:
Choose an answer
Confidentiality
Service
Liability
Loading
Previous
Skip
Next
Question # 11
Which are used for authentication to enter a system ?
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 12
Which of the following is not the characteristics of phishing emails ?
Choose an answer
Official data breach notification
Email account update
IT remainder
Similar domain of actual website
Previous
Skip
Next
Back