9th Computer Science Chapter6 Computer Security and Ethics
Sr # | Questions | A | B | C | D |
---|---|---|---|---|---|
1 | What is the purpose of antivirus software? | To spread malware | To detect and remove malware from computer systems | To increase computer performance | To encrypt data for secure transmission | 2 | What does privacy in computer ethics refer to? | The protection of personal information from unauthorized access or disclosure | The ability to access computer resources without restriction | The speed at which data can be transmitted over a network | The process of securing computer systems from malware attacks | 3 | Why is computer security important? | To increase the speed of data transmission | To ensure the confidentiality, integrity, and availability of data | To maximize the number of users accessing the network | To reduce the cost of maintaining computer systems | 4 | What is the primary goal of computer security? | To prevent any unauthorized access to computer systems | To make computer systems faster | To maximize network bandwidth | To eliminate the need for passwords | 5 | What does cyberbullying entail? | Ethical use of computer resources in educational settings | Unauthorized access to computer systems for malicious purposes | Harassment or intimidation of individuals using electronic communication, often through social media or online platforms | The ethical guidelines for conducting research using computer technology | 6 | Which precaution helps prevent malware infections when browsing the internet? | Disable firewall protection | Click on pop-up ads and suspicious links | Download files from unknown sources | Avoid visiting suspicious websites and clicking on suspicious links | 7 | What is the advantage of biometric authentication over traditional password-based authentication? | Biometric authentication is less secure. | Biometric authentication requires less processing power. | Biometric authentication eliminates the need to remember passwords. | Biometric authentication is easier to implement. | 8 | What is malware? | Software that enhances computer security | Software that helps improve computer performance | Software designed to disrupt, damage, or gain unauthorized access to computer systems | Software that provides entertainment on computers | 9 | What does computer crime involve? | Ethical use of computer resources in business environments | Unauthorized access to computer systems for beneficial purposes | Illegal activities conducted using computer technology, such as hacking, fraud, and identity theft | The ethical guidelines for computer scientists and engineers | 10 | What is the primary characteristic of a worm? | It replicates itself and spreads across networks without human intervention. | It attaches itself to executable files and spreads when the files are executed. | It hides within other programs and waits for specific conditions to execute. | It monitors and collects user information without their knowledge. | 11 | What does computer ethics primarily concern? | Ensuring computers operate efficiently | Preventing unauthorized access to computer systems | Guiding the moral conduct of individuals and organizations in computing-related activities | Maximizing profits from computer technology | 12 | What is multimodal authentication? | Authentication using multiple devices simultaneously | Authentication using multiple biometric factors | Authentication using multiple passwords | Authentication using multiple authentication servers |