11th class Computer unit 6 MCQs

a. Worm
b. Trapdoor
c. Bomb
d. Trojan horse

d. Trojan horse

a. Fingerprint
b. Access card
c. PIN
d. Password

a. Fingerprint

a. Public domain software
b. Encrypted software
c. Shareware
d. Copy protected software

a. Public domain software

a. Software
b. Internal components
c. Locks and cables
d. All of these

d. All of these

a. Password
b. Biometric data
c. Private word
d. Data encryption

a. Password

a. Putting people on junk mailing lists
b. Extortion of bank funds
c. Software piracy
d. IRS database sabotage

a. Putting people on junk mailing lists

a. Highly trained computer consultants
b. Hackers
c. International spies
d. All of these

a. Highly trained computer consultants

a. Shareware
b. Public domain
c. Copy protected
d. A and B both

b. Public domain

a. Should be free, according to the original hacker ethic
b. A marketable commodity
c. Can be stolen while leaving the original behind
d. All of these

d. All of these

a. Software piracy
b. Software hacking
c. Software distribution
d. Software browsing

a. Software piracy

a. Personal issue
b. Piracy
c. Assets
d. Privacy

d. Privacy

a. Loss of software
b. Loss of hardware
c. Loss of printouts
d. Loss of data

d. Loss of data

a. Pirates
b. Hacker
c. User
d. Worm

b. Hacker

a. Computer experts
b. Outsiders
c. Computer programmer
d. Insiders

a. Computer experts

a. Moving of data
b. Backup of data
c. Transfering Data
d. Set of data

b. Backup of data

a. Audit control
b. Computer monitoring
c. Computer security
d. Electronic policing

c. Computer security

a. Physically security
b. Logical security
c. User security
d. Enterprise security

a. Physically security

a. PIN
b. Access cards
c. Piracy
d. Fingerprint

c. Piracy

a. Word related to a job or hobby
b. Name of a partner or spouse
c. Combination of letters, numbers and symbols
d. Name of a child or pet

c. Combination of letters, numbers and symbols

a. Internet Service provider
b. User
c. Organization obtaining the data
d. LAN administrator

c. Organization obtaining the data

a. Software browsing
b. Software piracy
c. Software hacking
d. Software distribution

b. Software piracy

a. Shareware
b. Freeware
c. Vertical
d. Groupware

a. Shareware

a. Tape device
b. Floppy diskette
c. Zip disk
d. All

d. All

a. Moving data
b. Backup of data
c. Additional data
d. Copying data

b. Backup of data

a. Secrecy
b. Privacy
c. Right
d. Private

b. Privacy

a. Computer operator
b. Hacker
c. Authorized person
d. Network controller

b. Hacker

a. Software piracy
b. Software copyright
c. Intellectual property right
d. Site license

b. Software copyright

click here to go directly on chapter no.7

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *