More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science 9th Class English Medium Chapter 4 Online Test MCQs With Answers
Question # 1
Companies want to read minds of Web surfers and sometimes they store some piece of information with the Web surfer, called:
Choose an answer
Integrity
Cyber
Cookies
Online piracy
Previous
Skip
Next
Question # 2
NADRA stands for:
Choose an answer
National Database and Registration Authority
National Database Resolution
Registration Authority
National Drugs Registration
Previous
Skip
Next
Question # 3
Which are usually the secrets that are playing an important role for the success of a company ?
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 4
Encoding means conversion of the data to an unreadable format which is called:
Choose an answer
Ciphertext
Online banking
Client
Encryption
Previous
Skip
Next
Question # 5
Which are used for authentication to enter a system ?
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 6
Which means that we want to have access to the data when we want ?
Choose an answer
Patent
Availibility
Client
Software piracy
Previous
Skip
Next
Question # 7
A crime in which computer network or devices are used is called a:
Choose an answer
Lefting
Phishing crime
Identity Theft
Cybercrime
Previous
Skip
Next
Question # 8
Which is a general term for any type of information processing that can be represented mathematically ?
Choose an answer
Computation
Liability
Client server oversue
Online piracy
Previous
Skip
Next
Question # 9
To protect value and usefulness we may imply:
Choose an answer
Trade secrets
Cyber
Client server overuse
Online piracy
Previous
Skip
Next
Question # 10
Which means installing and selling unauthorized copies of software on refurbished or new computers ?
Choose an answer
Confidentiality
Privacy
Online Privacy
Hard-disk loading
Previous
Skip
Next
Question # 11
Which methods are the methods of encryption in which the characters of original text are replaced by some other characters ?
Choose an answer
Service
Counterfeiting
Client
Substitution Cipher
Previous
Skip
Next
Question # 12
Some software companies sell software with a confidential text, called the:
Choose an answer
Key
Privacy
Software
Phishing
Previous
Skip
Next
Question # 13
Illegally accessing someone else's computer is called:
Choose an answer
Hacking
Sabotaged
Passwords
Decryption
Previous
Skip
Next
Question # 14
Which is a cyber attack to make machine or network resource unavailable for a user ?
Choose an answer
Softlifting
Liability
Denial of service
Online piracy
Previous
Skip
Next
Question # 15
Using computer for the purpose of some unauthorized activities is called:
Choose an answer
Fraud or misuse
Selling and printing
Denial of service
Piracy
Previous
Skip
Next
Back