Search This Blog

Friday 14 May 2021

Computer Science (New) - For Class IX - UNIT. 5. Computer Security and Ethics - MCQs, Fill In The Blanks And Abbreviations

GO TO INDEX

Chapter No.5. Computer Security and Ethics
MCQs And Fill In The Blanks

Multiple Choice Questions (MCQs)


Choose the right answer
1. The broad term that encompasses different harmful software is:
(a) virus
(b) malware ✓
(c) adware
(d) spyware

2. The authentication mechanism that only allows the real person to access data or device is:
(a) username and password
(b) PIN
(c) biometric ✓
(d) scan code

3. Software are mostly protected under:
(a) patents
(b) copyrights ✓
(c) trademarks
(d) logos

4. The professional ethics in computer held is important because:
(a) it is necessary by law
(b) violation can cause serious penalties
(c) it is useful for financial benefits
(d) it creates healthy and positive work environment ✓

5. Free Antivirus Software often:
(a) expire after sometimes
(b) offer only limited service ✓
(c) cannot be updated
(d) cannot be purchased

6. Copying and pasting some texts from internet without acknowledging the real author is an example of:
(a) plagiarism ✓
(b) illegal use of patent
(c) information piracy
(d) copyright violation

7. Since it does not harm or steal data, the least harmful malware is:
(a) virus
(b) adware ✓
(c) spyware
(d) Trojan

8. The malware that replicates itself and doesn't need to attach with any files is:
(a) virus
(b) adware ✓
(c) spyware
(d) worm

9. Through which virus spreads?
(a) Email Attachments
(b) Internet Downloads
(c) Flash Disks and CDs
(d) All of them ✓

10. "Click this link and win a $5 voucher at McDonald's". This is an example of:
(a) scam
(b) phishing
(c) clickjacking ✓
(d) hacking

11. According to Pakistan's Cybercrime Law, any offender may be sent to jail for:
(a) 1 to 3 years
(b) 3 to 5 years ✓
(c) 5 to 7 years
(d) 7 to 10 years

12. It is a method of trying to gather personal information using false e-mails and websites.
(a) Hacking
(b) Clickjacking
(c) Phishing ✓
(d) Cracking

13. Boot Sector, Resident, and File Infector are some examples of:
(a) viruses ✓
(b) adware
(c) spyware
(d) worms

14. Advertising-supported software which presents endless ads and pop-up windows that could potentially consume memory and processing resources is called:
(a) viruses
(b) adware ✓
(c) spyware
(d) worm

15. A malware that monitors a device and steals important information and sends such information to another person or organization is called:
(a) viruses
(b) adware
(c) spyware ✓
(d) worm

16. System monitors cookies trackers, rootkits and key-loggers are few examples of:
(a) viruses
(b) adware
(c) spyware ✓
(d) worm

17. It is one of the largest computer security companies in the world.
(a) Avira
(b) McAfee
(c) Norton
(d) Avast ✓

18. PIN stands for:
(a) Personal Identification Number ✓
(b) Proper Identification Number
(c) Post Identification Number
(d) Paid Identification Number

19. It is presenting someone else's work or ideas as your own without full acknowledgment to the author or conceiver.
a) Trademark
(b) Patent
(c) Copyright
(d) Plagiarism ✓

20. Turnitin is a popular service for checking:
(a) Copyright
(b) Plagiarism ✓
(c) Software piracy
(d) Patent

21. The crime that is committed though a computer and network.
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime

22. Hacker uses his or her skills to identify and overcome a network:
(a) loophole
(b) error
(c) fault
(d) mistake ✓

23. Persons who gain unauthorized access to another system are:
(a) hackers
(b) phishers
(c) crackers ✓
(d) None of them

24. It is done when a cybercriminal uses computer or any device to enter or attacks to other single or multiple computer networks.
(a) cyber-war
(b) cyber-attack ✓
(c) cyber-strike
(d) cyber-sin

25. It is a broad term that encompasses computer viruses, worms, spyware, adware and others that is written generally to cause a mess.
(a) Malware
(b) Malicious software
(c) Both 'a' and 'b' ✓
(d) None of them

26. Utility software designed to protect computers from any potential threats of data or hardware loss from viruses or malware are called:
(a) Firewalls
(b) Anti-spywares
(c) Security-wares
(d) Antiviruses ✓

27. The illegal use, copying or distribution of copyrighted software is called:
(a) software piracy ✓
(b) software theft
(c) software threat
(d) software robbery

28. Stealing passwords and important information are some of the examples of:
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime

29. Hacking social media accounts, accessing anyone else's account and making transactions, committing online frauds are some of the examples of:
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime

30. _________ can also help us to improve the data and network security.
(a) Hackers ✓
(b) Phishers
(c) Crackers
(d) None of them

31. Credit and Debit Card Scam, Phishing, Clickjacking, Cyber Bullying or Harassment are examples of:
(a) Net-crime
(b) Internet crime
(c) Cyber-crime ✓
(d) Online crime

32. ______ is perhaps the most common crime in the computer world.
(a) Hacking ✓
(b) Phishing
(c) Cracking
(d) None of them

33. _______ can steal our WiFi, email or social media accounts' passwords.
(a) Hackers ✓
(b) Phishers
(c) Crackers
(d) None of them

34. _______ also attack a website and take it down.
(a) Hackers ✓
(b) Phishers
(c) Crackers
(d) None of them

35. ______ can make fraudulent transactions by stealimg information of our debit or credit card.
(a) Hackers
(b) Phishers
(c) Crackers
(d) Scammers ✓

36. The culprit tries to enter in a computer system and network through cracking, scam links, phishing or any other method.
(a) cyber-warrior
(b) cyber-attacker ✓
(c) cyber-striker
(d) cyber-sinner

37. The victims of cybercrimes may complaint by calling helpline ____ which is available 24/7.
(a) 1199
(b) 9911
(c) 1991 ✓
(d) 9191
(Note: In text book 9911 is given but correct help line number in Pakistan is for complaint for cybercrime is 1991)

38. Types of ____ can include computer viruses, worms, adware, and spyware.
(a) cyber-attack
(b) malware ✓
(c) hackers
(d) cybercrime

39. This malware programs include games, desktop toolbars or utilities.
(a) viruses
(b) adware ✓
(c) spyware
(d) worm

40. This malware is web-based and collects web browser data to target advertisements, especially pop-ups.
(a) viruses
(b) adware ✓
(c) spyware
(d) worm

41. Trojan horses, Rootkit, Backdoors, and Bots are example of:
a) viruses ✓
(b) adware
(c) spyware
(d) worm

42. It is a security code for verifying your identity.
a) Username and Password
b) PIN ✓
c) Biometric
d) Scan Code

43. The ______ provides security when a credit/debit card is lost or stolen.
a) Username and Password
b) PIN ✓
c) Biometric
d) Scan Code

44. It causes a signicant loss of revenue for developers and vendors.
(a) Copyright
(b) Plagiarism
(c) Software piracy ✓
(d) Patent

Fill In The Blanks

1. Computer security is the protection against damage or theft of computer hardware, its software, and information present on them from threat of viruses or unauthorized use.
2. Cybercrime is illegal and also punishable.
3. Government and business organizations are now hiring ethical hackers, also known as white hat hackers, to prevent data theft.
4. The hackers can steal sensitive information from government and business organizations, make fraudulent transactions and erase data on the cloud or network computers.
5. Debit and credit cards are also secured with PIN codes.
6. Electronic means like a computer, mobile phone or internet are also used for online bullying or harassment and giving threats.
7. Cyber-attack or cyber harassment victim should report to the trusted people and government authorities.
8. A cyber-attack either disables the targeted computer, deletes information or knocks it offline.
9. A cyber-attack may also steal information from the computer or network.
10. The term malware is the contraction of malicious software.
11. Commonly malware encrypt, steal or delete data, hijack core functions of computing and disturb different activities.
12. Viruses or malware can be spread from USB Flash Disks and CDs, Internet Downloads, Computer Networks and Email Attachments.
13. A computer virus is just like a flu virus.
14. Paid customers are called premier users and they get advance security features.
15. Norton antivirus has been a popular antivirus utility since 1991.
16. Norton antivirus is a part of a large family of security and other utility software by Symantec Corporation.
17. McAfee claims that it provides a combination of antivirus, privacy and identity tools and features.
18. McAfee enables users to stay protected against the latest virus, malware, ransomware and spyware attacks while keeping their identity and privacy protected and personal.
19. For data safety, the back-up of important files should be made at more than one place.
20. The authentication mechanism is the hardware or software-based mechanisms that make sure the only authenticated user gets access to data or devices.
21. A username and password are the pair of keywords known by the user.
22. Usernames and passwords are the default authentication mechanism on the web today.
23. Biometric authentication relies on the unique biological characteristics of a person.
24. Scanning fingerprints are the most common way of biometric.
25. Retinal scans and iris, facial and voice recognitions are the other advance ways of biometric.
26. Professional ethics involve the personal and corporate principles and rules that guide behavior within the context of a profession.
27. The information accuracy is the type of measurement that assures the information is correct and true.
28. Intellectual property is intangible creations of the human intellect.
29. To prevent theft or illegal use or spread of intellectual property, Intellectual Property Right is exercised.
30. The intellectual property rights are protected with the help of copyrights, patents, and trademarks.
31. A patent is a grant of exclusive rights for an invention to make, use and sell the invention for a limited period.
32. Copyright is a legal instrument that provides legal rights to the creator of artwork, literature, or a work that conveys information or ideas.
33. Copyright is the right of copying.
34. The © sign is also often displayed on copyrighted objects.
35. Trademark identifies a product or service and distinguishes it from other products and services.
36. Trademark helps organizations to market their products and services locally and globally.
37. Pirated software users cannot access customer support, upgrades, technical documentation, training, and bug fixes.
38. Copy- protection demands the user to enter certain keys or credentials.

Abbreviations

ATM: Automated Teller Machine
© : Copyright
CD: Compact Disk
DVD: Digital Versatile Disc
IPO: Intellectual Property Organization
LAN: Local Area Network
Malware: Malicious software
OMG: Oh! My God
OS: Operating system
PIN: Personal Identification Number
SD cards: Secure Digital cards
TM or TMTrade Mark
USB: Universal Serial Bus
WiFi: Wireless Fidelity

Refence links Given In Text Book


21 comments:

  1. Replies
    1. Education is the key to success25 December 2021 at 18:51

      JAZAKALLAH

      Delete
  2. I am very impressed with your post because this post is very beneficial for me and provide a new knowledge to me.
    google-chrome
    hyper-snap/
    clamwin-antivirus

    ReplyDelete
    Replies
    1. Education is the key to success17 January 2022 at 19:03

      Thank you

      Delete
  3. Great work with the hard work you have done I appreciate your work thanks for sharing it...
    ibeesoft-data-recovery-crack
    eset-nod32-antivirus
    blue-iris

    ReplyDelete
    Replies
    1. Education is the key to success17 January 2022 at 19:02

      Thank you so much for your appreciation

      Delete
  4. Great job on the hard effort you've put in. I appreciate it and thank you for sharing it.
    ibeesoft-data-recovery-crack
    movavi-video-suite

    ReplyDelete
    Replies
    1. Education is the key to success28 January 2022 at 04:28

      JAZAKALLAH

      Delete
  5. Amazing! Its a genuinely remarkable piece of writing, I
    have got much clear idea on the topic from this post.
    Blue Iris Crack

    ReplyDelete

  6. Such a Nice post. Thanks for great tips and work Keep it up
    Blue Iris Crack

    ReplyDelete
    Replies
    1. Education is the key to success4 February 2022 at 22:14

      Thank you so much for your appreciation.
      JAZAKALLAH

      Delete
  7. Really Good Work Done By You...However, stopping by with great quality writing, it's hard to see any good blog today.
    ClamWin Antivirus Crack

    ReplyDelete
    Replies
    1. Education is the key to success30 March 2022 at 00:16

      Thank you so much for your valuable feedback
      JAZAKLLAH

      Delete
  8. Really Good Work Done By You...However, stopping by with great quality writing, it's hard to see any good blog today./
    ClamWin Antivirus Crack

    ReplyDelete
    Replies
    1. Education is the key to success30 March 2022 at 00:19

      Thank you so much for your valuable feedback
      JAZAKLLAH

      Delete
  9. Education is the key to success30 March 2022 at 00:17

    Thank you so much for your worth compliment and appreciation
    JAZAKALLAH

    ReplyDelete
  10. I am very impressed with your post because this post is very beneficial for me and provides new knowledge…
    Blue Iris Crack

    ReplyDelete
  11. Education is the key to success29 September 2022 at 20:44

    JAZAKALLAH

    ReplyDelete
  12. Replies
    1. Education is the key to success10 January 2023 at 18:15

      JAZAKALLAH

      Delete