More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
In this method, we have a substitution key that is combined with the plaintext to generate the ciphertext:
Choose an answer
Vigenere Cipher method
Simple method
Complexmethod
Roundmethod
Previous
Skip
Next
Question # 2
Using _______ companies are able to track purchases and gather personal data:
Choose an answer
Data
Infomation
Cookies
Online piracy
Previous
Skip
Next
Question # 3
Typically involves downloading illegal software:
Choose an answer
Lefting
Phishing crime
Identity Theft
Online piracy
Previous
Skip
Next
Question # 4
To protect value and usefulness we may imply:
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 5
Some malicious user disguises himself as our friend and tries to get some confidential information:
Choose an answer
Lefting
Phishing
Identity Theft
Online piracy
Previous
Skip
Next
Question # 6
Which of the following is not a characteristic of good password ?
Choose an answer
Is eight characters long
Doesn't contain username
Contains uppercase letters
Password is your name only
Previous
Skip
Next
Question # 7
Which is installing more copies of the software than you have license for ?
Choose an answer
Internet cyber text
Cyber
Client server oversue
Online piracy
Previous
Skip
Next
Question # 8
Which of the following is not the characteristics of phishing emails ?
Choose an answer
Official data breach notification
Email account update
IT remainder
Similar domain of actual website
Previous
Skip
Next
Question # 9
Illegally accessing someone else's computer is called:
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 10
A _________ is a computer program written with negative intentions:
Choose an answer
Patent
Virus
Client
Software piracy
Previous
Skip
Next
Question # 11
The computer can be attacked while sitting remotely, in this way sensitive information will be:
Choose an answer
Hacking
Sabotaged
Identity Theft
Decryption
Previous
Skip
Next
Question # 12
A computer expert who can steal data when it moves from on location to other, is called:
Choose an answer
Hacker
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 13
NADRA stands for:
Choose an answer
National Database and Registration Authority
National Database Resolution
Registration Authority
National Drugs Registration
Previous
Skip
Next
Back