Smartindia Classroom
CONTENTS
Physics
Mathematics
Computer science
Chemistry
Back to home
Start Practice
Question-1
Which form of attack will used by hackers to get into remote computers?
(A)
Sweeper
(B)
Password guessing
(C)
Worms
(D)
Viruses
Question-2
Which of the following measures will involve in data security?
(A)
Secured waste
(B)
Internal controls
(C)
Cryptography
(D)
All of these
Question-3
Which type of software is said to be illegal?
(A)
Unauthorized copying
(B)
Copyrighted
(C)
Shareware
(D)
Public domain software
Question-4
Which one is not the major ethical issue?
(A)
Individual’s Right to Privacy
(B)
Intellectual Property Rights
(C)
Accuracy of Information
(D)
Unauthorized copying
Question-5
Which of the following is a computer crime?
(A)
System scanning at regular intervals
(B)
Theft of computer time
(C)
Swapping floppy disk
(D)
Conducting audit
Question-6
Which of the following is an alternative to unauthorized copying?
(A)
Public domain software
(B)
Shareware
(C)
Both a and b
(D)
Only a
Question-7
Which one is an example for white-collar crimes?
(A)
Using pirated software
(B)
Changing the passwords frequently
(C)
Installing bugs
(D)
Write protected
Question-8
How the hackers delete all the data from the system?
(A)
Using Trojan horses
(B)
By spamming
(C)
Through the attack sweeper
(D)
Inject some worms
Question-9
Give an example for malicious form in which the attacker keeps on sending bulk mail?
(A)
Email bombing
(B)
Sniffing
(C)
Spamming
(D)
Denial of Services
Question-10
Which form of attack will hackers used to attack the computers?
(A)
Spamming
(B)
Trojan horses
(C)
Counterfeit
(D)
Both a and b
Your Score 0/10
Click
here
to see your answersheet and detailed track records.
Plus 2 Computer Science
Tamil Nadu (English Medium)
Practice in Related Chapters
Object Oriented Concept using C++
Text Formatting
An Introduction to Star Office Writer
Computer Organisation
Spreadsheet
Page Formatting
Working with Tables
Correcting Spelling Mistakes
Introduction to Multimedia
Presentation
Database
Overview of C++
Basic Statement
Functions C++ Enhancements
Structured Data Type Arrays
Classes and Object
Polymolphism
Constructor and Destructor
Inheritance
Impact of Computers on society
Computer Ethics
IT Enabled Services
Powered By