More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
Which is called duplicating and selling copyrighted programs ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 2
Which can protect and idea so that it won't be misuse and the owner will attain its full rights ?
Choose an answer
Hacking
Patent
Identity Theft
Decryption
Previous
Skip
Next
Question # 3
Which is the process of encoding data ?
Choose an answer
Service
Online banking
Client
Encryption
Previous
Skip
Next
Question # 4
CAPTCHA stands for:
Choose an answer
Completely Automated Public Turning
Completely Automated
Automated Public Turning
Automated
Previous
Skip
Next
Question # 5
In this method, we have a substitution key that is combined with the plaintext to generate the ciphertext:
Choose an answer
Vigenere Cipher method
Simple method
Complexmethod
Roundmethod
Previous
Skip
Next
Question # 6
A crime in which computer network or devices are used is called a:
Choose an answer
Lefting
Phishing crime
Identity Theft
Cybercrime
Previous
Skip
Next
Question # 7
Which are usually the secrets that are playing an important role for the success of a company ?
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 8
NADRA stands for:
Choose an answer
National Database and Registration Authority
National Database Resolution
Registration Authority
National Drugs Registration
Previous
Skip
Next
Question # 9
Which is the process of encoding data in such a way that only authorized person can read it ?
Choose an answer
Service
Counterfeiting
Client
Encryption
Previous
Skip
Next
Question # 10
Illegally accessing someone else's computer is called:
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 11
Which are used for authentication to enter a system ?
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 12
Making illegal copies of software is called:
Choose an answer
Stolen
Phishing crime
Identity Theft
Piracy
Previous
Skip
Next
Question # 13
Vigenere Cipher is another substitution cipher, which uses a table known as:
Choose an answer
Vigenere Cipher table
Simple table
Complex table
Round table
Previous
Skip
Next
Back