9th Computer Science Chapter6 Computer Security and Ethics
Sr # | Questions | A | B | C | D |
---|---|---|---|---|---|
1 | What does computer ethics primarily concern? | Ensuring computers operate efficiently | Preventing unauthorized access to computer systems | Guiding the moral conduct of individuals and organizations in computing-related activities | Maximizing profits from computer technology | 2 | What does cyberbullying entail? | Ethical use of computer resources in educational settings | Unauthorized access to computer systems for malicious purposes | Harassment or intimidation of individuals using electronic communication, often through social media or online platforms | The ethical guidelines for conducting research using computer technology | 3 | What is a potential consequence of ransomware infection? | Increased computer performance | Loss of important data or files | Enhanced system security | Improved network speed | 4 | What is the best practice to protect a computer from malware? | Disable antivirus software | Download software from untrusted sources | Keep operating system and software up-to-date, use antivirus software, and exercise caution when browsing the internet or opening email attachments | Share passwords with friends and family | 5 | How do computer viruses typically spread from one computer to another? | Through physical contact with infected hardware | Through infected email attachments, malicious websites, or USB drives | Through overheating of computer components | Through electromagnetic interference | 6 | What is the main difference between a hacker and a cracker? | Hackers have malicious intent, while crackers seek to improve security. | Hackers are skilled computer experts, while crackers are inexperienced. | Hackers exploit vulnerabilities for personal gain, while crackers do so for altruistic reasons. | Hackers are illegal, while crackers are legal. | 7 | What is a common method used by worms to spread across networks? | Attaching themselves to executable files | Exploiting vulnerabilities in software to self-replicate and spread automatically | Hiding within legitimate programs and waiting for specific conditions to execute | Monitoring and collecting user information without their knowledge | 8 | What is the purpose of antivirus software? | To spread malware | To detect and remove malware from computer systems | To increase computer performance | To encrypt data for secure transmission | 9 | Which of the following is an example of multimodal authentication? | Using a fingerprint and a password to unlock a device | Using the same password for different accounts | Using multiple devices to generate a one-time password | Using a single authentication server for all users | 10 | What is multimodal authentication? | Authentication using multiple devices simultaneously | Authentication using multiple biometric factors | Authentication using multiple passwords | Authentication using multiple authentication servers | 11 | Unauthorized access refers to: | Access granted to users with proper credentials | Access denied to users without proper credentials | Access granted to users without proper credentials | Access denied to users with proper credentials | 12 | What is the advantage of biometric authentication over traditional password-based authentication? | Biometric authentication is less secure. | Biometric authentication requires less processing power. | Biometric authentication eliminates the need to remember passwords. | Biometric authentication is easier to implement. |