Fbise Notes-Computer | Computer Security and Ethics MCQs Chapter No. 6




Computer Security and Ethics CH# 06

Multiple Choice

Q. 1     Insert the correct option i.e. A/B/C/D in the empty box.


 i.      What is a person who illegally breaks into other's computer system called?
    A.     Computer Engineer                B.    System Programmer    
    C.      Hacker                                    D.     Cracker  

ii.    What is a person who uses special tools for breaking into computer systems called?
    A.     Computer Engineer                B.    System Programmer 
    C.      Hacker                                    D.     Cracker  




 iii.      Which Malware spreads automatically in computer networks and replicates itself?
                  A.     Virus                                         B.  Worm
                  C.      Adware                                    D.  Spyware

 



 iv.     Which of the following Malware displays advertisements on the screen?
                  A.      Virus                                        B.  Worm
                  C.      Adware                                    D.  Spyware




  v.     Which of the following authentication method is used for opening security gates?
                  A.      Username and Password       B.  Personal Identification Number  
                  C.      Access card                           D.  Bio-metrics




 vi.      Which of the following authentication method is most reliable?
                  A.      Username and Password       B.  Personal Identification Number  
                  C.      Access card                            D.  Bio-metrics




 vii.     Which of the following authentication method is based on features of individuals                   such as face, fingerprint and voice ?
                  A.      Username and Password       B.   Personal Identification Number  
                  C.      Access card                           D.    Bio-metrics




 viii.    What is making illegal copies of copyright software for use on other computers or                  sale called?
                 A.      Information Piracy                         B.   Intellectual rights
                 C.     Software Piracy                               D.   Information Ownership
  



  ix.     Which of the following Malware gathers information about user activities on                            computer ?
                 A.      Virus                                      B.   Worm
                  C.     Adware                                  D.    Spyware




  x.       Which of the following authentication method is used to draw cash from ATM ?
                  A.      Username and Password       B.  Personal Identification Number  
                  C.      Access card                            D.  Bio-metrics

Note: Must Subscribe to get the latest copies of fbise notes,computer science mcqs, computer science 9th class notes, computer science notes for class 10, board papers and much more. 


➤➤➤➤➤➤➤➤➤➤➤
Fbise Notes-Computer | Computer Security and Ethics MCQs Chapter No. 6 Fbise Notes-Computer | Computer Security and Ethics MCQs Chapter No. 6 Reviewed by fbisenotes on July 20, 2019 Rating: 5

No comments:

Powered by Blogger.