Smartindia Classroom
CONTENTS
Physics
Mathematics
Computer science
Chemistry
Back to home
Start Practice
Question-1
Which form of attack will hackers used to attack the computers?
(A)
Spamming
(B)
Trojan horses
(C)
Counterfeit
(D)
Both a and b
Question-2
Which mechanism will prevent the unauthorized internet users from accessing intranets?
(A)
Firewall
(B)
Identification
(C)
Authentication
(D)
Authorization
Question-3
Which one is meant by denial of intellectual property rights to the software creator/developer?
(A)
Software privacy
(B)
Soft lifting
(C)
Hacking
(D)
Uploading
Question-4
Which of the following is a computer crime?
(A)
System scanning at regular intervals
(B)
Theft of computer time
(C)
Swapping floppy disk
(D)
Conducting audit
Question-5
Which of the following is an alternative to unauthorized copying?
(A)
Public domain software
(B)
Shareware
(C)
Both a and b
(D)
Only a
Question-6
Which of the following is a computer crime?
(A)
System scanning at regular intervals
(B)
Theft of computer time
(C)
Swapping floppy disk
(D)
Conducting audit
Question-7
Which of the following measures will involve in data security?
(A)
Secured waste
(B)
Internal controls
(C)
Cryptography
(D)
All of these
Question-8
Which form of attack will used by hackers to get into remote computers?
(A)
Sweeper
(B)
Password guessing
(C)
Worms
(D)
Viruses
Question-9
Which network security technique is performed by asking the user a legal login – id?
(A)
Authentication
(B)
Firewall
(C)
Authorization
(D)
Identification
Question-10
What do you mean by unauthorized access to or from a private network?
(A)
Authentication
(B)
Authorization
(C)
Password protection
(D)
Firewall
Your Score 0/10
Click
here
to see your answersheet and detailed track records.
Plus 2 Computer Science
Tamil Nadu (English Medium)
Practice in Related Chapters
Object Oriented Concept using C++
Text Formatting
An Introduction to Star Office Writer
Computer Organisation
Spreadsheet
Page Formatting
Working with Tables
Correcting Spelling Mistakes
Introduction to Multimedia
Presentation
Database
Overview of C++
Basic Statement
Functions C++ Enhancements
Structured Data Type Arrays
Classes and Object
Polymolphism
Constructor and Destructor
Inheritance
Impact of Computers on society
Computer Ethics
IT Enabled Services
Powered By