Live Education Quiz

9th Computer Science Chapter6 Computer Security and Ethics

Sr #QuestionsABCD
1

What is the purpose of antivirus software?

To spread malware To detect and remove malware from computer systems To increase computer performance To encrypt data for secure transmission
2

What is the main difference between a hacker and a cracker?

Hackers have malicious intent, while crackers seek to improve security. Hackers are skilled computer experts, while crackers are inexperienced. Hackers exploit vulnerabilities for personal gain, while crackers do so for altruistic reasons. Hackers are illegal, while crackers are legal.
3

Which type of malware is designed to spread from one computer to another by attaching itself to executable files?

Virus Worm Trojan horse Spyware
4

What is the advantage of biometric authentication over traditional password-based authentication?

Biometric authentication is less secure. Biometric authentication requires less processing power. Biometric authentication eliminates the need to remember passwords. Biometric authentication is easier to implement.
5

How do computer viruses typically spread from one computer to another?

Through physical contact with infected hardware Through infected email attachments, malicious websites, or USB drives Through overheating of computer components Through electromagnetic interference
6

Which term refers to an individual who gains unauthorized access to computer systems for malicious purposes?

Hacker Cracker Cybercriminal Script kiddie
7

What is multimodal authentication?

Authentication using multiple devices simultaneously Authentication using multiple biometric factors Authentication using multiple passwords Authentication using multiple authentication servers
8

What does computer ethics primarily concern?

Ensuring computers operate efficiently Preventing unauthorized access to computer systems Guiding the moral conduct of individuals and organizations in computing-related activities Maximizing profits from computer technology
9

What is intellectual property in the context of computer ethics?

The physical hardware components of a computer system The legal rights to creative works, such as software, music, and writings, produced by individuals or companies The process of protecting computer systems from unauthorized access The ethical guidelines for computer programmers and developers
10

Why is computer security important?

To increase the speed of data transmission To ensure the confidentiality, integrity, and availability of data To maximize the number of users accessing the network To reduce the cost of maintaining computer systems
11

What does computer crime involve?

Ethical use of computer resources in business environments Unauthorized access to computer systems for beneficial purposes Illegal activities conducted using computer technology, such as hacking, fraud, and identity theft The ethical guidelines for computer scientists and engineers
12

Which of the following is a common symptom of a malware infection?

Improved computer performance Increased storage space availability Unexplained changes to system settings or files Reduced internet speed