GO TO INDEX
Chapter No.5. Computer Security and Ethics
MCQs And Fill In The Blanks
Multiple Choice Questions (MCQs)
Choose the right answer
1. The broad term that encompasses different harmful software is:
(a) virus
(b) malware ✓
(c) adware
(d) spyware
2. The authentication mechanism that only allows the real person to access data or device is:
(a) username and password
(b) PIN
(c) biometric ✓
(d) scan code
3. Software are mostly protected under:
(a) patents
(b) copyrights ✓
(c) trademarks
(d) logos
4. The professional ethics in computer held is important because:
(a) it is necessary by law
(b) violation can cause serious penalties
(c) it is useful for financial benefits
(d) it creates healthy and positive work environment ✓
5. Free Antivirus Software often:
(a) expire after sometimes
(b) offer only limited service ✓
(c) cannot be updated
(d) cannot be purchased
6. Copying and pasting some texts from internet without acknowledging the real author is an example of:
(a) plagiarism ✓
(b) illegal use of patent
(c) information piracy
(d) copyright violation
7. Since it does not harm or steal data, the least harmful malware is:
(a) virus
(b) adware ✓
(c) spyware
(d) Trojan
8. The malware that replicates itself and doesn't need to attach with any files is:
(a) virus
(b) adware ✓
(c) spyware
(d) worm
9. Through which virus spreads?
(a) Email Attachments
(b) Internet Downloads
(c) Flash Disks and CDs
(d) All of them ✓
10. "Click this link and win a $5 voucher at McDonald's". This is an example of:
(a) scam
(b) phishing
(c) clickjacking ✓
(d) hacking
11. According to Pakistan's Cybercrime Law, any offender may be sent to jail for:
(a) 1 to 3 years
(b) 3 to 5 years ✓
(c) 5 to 7 years
(d) 7 to 10 years
12. It is a method of trying to gather personal information using false e-mails and websites.
(a) Hacking
(b) Clickjacking
(c) Phishing ✓
(d) Cracking
13. Boot Sector, Resident, and File Infector are some examples of:
(a) viruses ✓
(b) adware
(c) spyware
(d) worms
14. Advertising-supported software which presents endless ads and pop-up windows that could potentially consume memory and processing resources is called:
(a) viruses
(b) adware ✓
(c) spyware
(d) worm
15. A malware that monitors a device and steals important information and sends such information to another person or organization is called:
(a) viruses
(b) adware
(c) spyware ✓
(d) worm
16. System monitors cookies trackers, rootkits and key-loggers are few examples of:
(a) viruses
(b) adware
(c) spyware ✓
(d) worm
17. It is one of the largest computer security companies in the world.
(a) Avira
(b) McAfee
(c) Norton
(d) Avast ✓
18. PIN stands for:
(a) Personal Identification Number ✓
(b) Proper Identification Number
(c) Post Identification Number
(d) Paid Identification Number
19. It is presenting someone else's work or ideas as your own without full acknowledgment to the author or conceiver.
a) Trademark
(b) Patent
(c) Copyright
(d) Plagiarism ✓
20. Turnitin is a popular service for checking:
(a) Copyright
(b) Plagiarism ✓
(c) Software piracy
(d) Patent
21. The crime that is committed though a computer and network.
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime
22. Hacker uses his or her skills to identify and overcome a network:
(a) loophole
(b) error
(c) fault
(d) mistake ✓
23. Persons who gain unauthorized access to another system are:
(a) hackers
(b) phishers
(c) crackers ✓
(d) None of them
24. It is done when a cybercriminal uses computer or any device to enter or attacks to other single or multiple computer networks.
(a) cyber-war
(b) cyber-attack ✓
(c) cyber-strike
(d) cyber-sin
25. It is a broad term that encompasses computer viruses, worms, spyware, adware and others that is written generally to cause a mess.
(a) Malware
(b) Malicious software
(c) Both 'a' and 'b' ✓
(d) None of them
26. Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called:
(a) Firewalls
(b) Anti-spywares
(c) Security-wares
(d) Antiviruses ✓
27. The illegal use, copying or distribution of copyrighted software is called:
(a) software piracy ✓
(b) software theft
(c) software threat
(d) software robbery
28. Stealing passwords and important information are some of the examples of:
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime
29. Hacking social media accounts, accessing anyone else's account and making transactions, committing online frauds are some of the examples of:
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime
30. _________ can also help us to improve the data and network security.
(a) Hackers ✓
(b) Phishers
(c) Crackers
(d) None of them
31. Credit and Debit Card Scam, Phishing, Clickjacking, Cyber Bullying or Harassment are examples of:
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime
32. ______ is perhaps the most common crime in the computer world.
(a) Hacking ✓
(b) Phishing
(c) Cracking
(d) None of them
33. _______ can steal our WiFi, email or social media accounts' passwords.
(a) Hackers ✓
(b) Phishers
(c) Crackers
(d) None of them
34. _______ also attack a website and take it down.
(a) Hackers ✓
(b) Phishers
(c) Crackers
(d) None of them
35. ______ can make fraudulent transactions by stealimg information of our debit or credit card.
(a) Hackers
(b) Phishers
(c) Crackers
(d) Scammers ✓
36. The culprit tries to enter in a computer system and network through cracking, scam links, phishing or any other method.
(a) cyber-warrior
(b) cyber-attacker ✓
(c) cyber-striker
(d) cyber-sinner
37. The victims of cybercrimes may complaint by calling helpline ____ which is available 24/7.
(a) 1199
(b) 9911
(c) 1991 ✓
(d) 9191
(Note: In text book 9911 is given but correct help line number in Pakistan is for complaint for cybercrime is 1991)
38. Types of ____ can include computer viruses, worms, adware, and spyware.
(a) cyber-attack
(b) malware ✓
(c) hackers
(d) cybercrime
39. This malware programs include games, desktop toolbars or utilities.
(a) viruses
(b) adware ✓
(c) spyware
(d) worm
40. This malware is web-based and collects web browser data to target advertisements, especially pop-ups.
(a) viruses
(b) adware ✓
(c) spyware
(d) worm
41. Trojan horses, Rootkit, Backdoors, and Bots are example of:
a) viruses ✓
(b) adware
(c) spyware
(d) worm
42. It is a security code for verifying your identity.
a) Username and Password
b) PIN ✓
c) Biometric
d) Scan Code
43. The ______ provides security when a credit/debit card is lost or stolen.
a) Username and Password
b) PIN ✓
c) Biometric
d) Scan Code
44. It causes a signicant loss of revenue for developers and vendors.
(a) Copyright
(b) Plagiarism
(c) Software piracy ✓
(d) Patent
Fill In The Blanks
1. Computer security is the protection against damage or theft of computer hardware, its software, and information present on them from threat of viruses or unauthorized use.2. Cybercrime is illegal and also punishable.
3. Government and business organizations are now hiring ethical hackers, also known as white hat hackers, to prevent data theft.
4. The hackers can steal sensitive information from government and business organizations, make fraudulent transactions and erase data on the cloud or network computers.
5. Debit and credit cards are also secured with PIN codes.
6. Electronic means like a computer, mobile phone or internet are also used for online bullying or harassment and giving threats.
7. Cyber-attack or cyber harassment victim should report to the trusted people and government authorities.
8. A cyber-attack either disables the targeted computer, deletes information or knocks it offline.
9. A cyber-attack may also steal information from the computer or network.
10. The term malware is the contraction of malicious software.
11. Commonly malware encrypt, steal or delete data, hijack core functions of computing and disturb different activities.
12. Viruses or malware can be spread from USB Flash Disks and CDs, Internet Downloads, Computer Networks and Email Attachments.
13. A computer virus is just like a flu virus.
14. Paid customers are called premier users and they get advance security features.
15. Norton antivirus has been a popular antivirus utility since 1991.
16. Norton antivirus is a part of a large family of security and other utility software by Symantec Corporation.
17. McAfee claims that it provides a combination of antivirus, privacy and identity tools and features.
18. McAfee enables users to stay protected against the latest virus, malware, ransomware and spyware attacks while keeping their identity and privacy protected and personal.
19. For data safety, the back-up of important files should be made at more than one place.
20. The authentication mechanism is the hardware or software-based mechanisms that make sure the only authenticated user gets access to data or devices.
21. A username and password are the pair of keywords known by the user.
22. Usernames and passwords are the default authentication mechanism on the web today.
23. Biometric authentication relies on the unique biological characteristics of a person.
24. Scanning fingerprints are the most common way of biometric.
25. Retinal scans and iris, facial and voice recognitions are the other advance ways of biometric.
26. Professional ethics involve the personal and corporate principles and rules that guide behavior within the context of a profession.
27. The information accuracy is the type of measurement that assures the information is correct and true.
28. Intellectual property is intangible creations of the human intellect.
29. To prevent theft or illegal use or spread of intellectual property, Intellectual Property Right is exercised.
30. The intellectual property rights are protected with the help of copyrights, patents, and trademarks.
31. A patent is a grant of exclusive rights for an invention to make, use and sell the invention for a limited period.
32. Copyright is a legal instrument that provides legal rights to the creator of artwork, literature, or a work that conveys information or ideas.
33. Copyright is the right of copying.
34. The © sign is also often displayed on copyrighted objects.
35. Trademark identifies a product or service and distinguishes it from other products and services.
36. Trademark helps organizations to market their products and services locally and globally.
37. Pirated software users cannot access customer support, upgrades, technical documentation, training, and bug fixes.
38. Copy- protection demands the user to enter certain keys or credentials.
Abbreviations
ATM: Automated Teller Machine© : Copyright
CD: Compact Disk
DVD: Digital Versatile Disc
IPO: Intellectual Property Organization
LAN: Local Area Network
Malware: Malicious software
OMG: Oh! My God
OS: Operating system
PIN: Personal Identification Number
SD cards: Secure Digital cards
TM or TM : Trade Mark
USB: Universal Serial Bus
WiFi: Wireless Fidelity
Cyber Ethics MCQs for Class 10th Computer Application Code 165
ReplyDeleteAppreciation is a wonderful thing...thanks for sharing kepp it up.
ReplyDelete/clip-studio-paint-ex
clamwin-antivirus-download
ibeesoft-data-recovery-crack
JAZAKALLAH
DeleteI am very impressed with your post because this post is very beneficial for me and provide a new knowledge to me.
ReplyDeletegoogle-chrome
hyper-snap/
clamwin-antivirus
Thank you
DeleteGreat work with the hard work you have done I appreciate your work thanks for sharing it...
ReplyDeleteibeesoft-data-recovery-crack
eset-nod32-antivirus
blue-iris
Thank you so much for your appreciation
DeleteGreat job on the hard effort you've put in. I appreciate it and thank you for sharing it.
ReplyDeleteibeesoft-data-recovery-crack
movavi-video-suite
JAZAKALLAH
DeleteAmazing! Its a genuinely remarkable piece of writing, I
ReplyDeletehave got much clear idea on the topic from this post.
Blue Iris Crack
ReplyDeleteSuch a Nice post. Thanks for great tips and work Keep it up
Blue Iris Crack
Thank you so much for your appreciation.
DeleteJAZAKALLAH
Really Good Work Done By You...However, stopping by with great quality writing, it's hard to see any good blog today.
ReplyDeleteClamWin Antivirus Crack
Thank you so much for your valuable feedback
DeleteJAZAKLLAH
Really Good Work Done By You...However, stopping by with great quality writing, it's hard to see any good blog today./
ReplyDeleteClamWin Antivirus Crack
Thank you so much for your valuable feedback
DeleteJAZAKLLAH
Thank you so much for your worth compliment and appreciation
ReplyDeleteJAZAKALLAH
I am very impressed with your post because this post is very beneficial for me and provides new knowledge…
ReplyDeleteBlue Iris Crack
JAZAKALLAH
ReplyDeleteThanks
ReplyDeleteJAZAKALLAH
Delete