9th Computer Science Chapter6 Computer Security and Ethics
| Sr # | Questions | A | B | C | D |
|---|---|---|---|---|---|
| 1 | What is the purpose of antivirus software? | To spread malware | To detect and remove malware from computer systems | To increase computer performance | To encrypt data for secure transmission | 2 | What is the main difference between a hacker and a cracker? | Hackers have malicious intent, while crackers seek to improve security. | Hackers are skilled computer experts, while crackers are inexperienced. | Hackers exploit vulnerabilities for personal gain, while crackers do so for altruistic reasons. | Hackers are illegal, while crackers are legal. | 3 | Which type of malware is designed to spread from one computer to another by attaching itself to executable files? | Virus | Worm | Trojan horse | Spyware | 4 | What is the advantage of biometric authentication over traditional password-based authentication? | Biometric authentication is less secure. | Biometric authentication requires less processing power. | Biometric authentication eliminates the need to remember passwords. | Biometric authentication is easier to implement. | 5 | How do computer viruses typically spread from one computer to another? | Through physical contact with infected hardware | Through infected email attachments, malicious websites, or USB drives | Through overheating of computer components | Through electromagnetic interference | 6 | Which term refers to an individual who gains unauthorized access to computer systems for malicious purposes? | Hacker | Cracker | Cybercriminal | Script kiddie | 7 | What is multimodal authentication? | Authentication using multiple devices simultaneously | Authentication using multiple biometric factors | Authentication using multiple passwords | Authentication using multiple authentication servers | 8 | What does computer ethics primarily concern? | Ensuring computers operate efficiently | Preventing unauthorized access to computer systems | Guiding the moral conduct of individuals and organizations in computing-related activities | Maximizing profits from computer technology | 9 | What is intellectual property in the context of computer ethics? | The physical hardware components of a computer system | The legal rights to creative works, such as software, music, and writings, produced by individuals or companies | The process of protecting computer systems from unauthorized access | The ethical guidelines for computer programmers and developers | 10 | Why is computer security important? | To increase the speed of data transmission | To ensure the confidentiality, integrity, and availability of data | To maximize the number of users accessing the network | To reduce the cost of maintaining computer systems | 11 | What does computer crime involve? | Ethical use of computer resources in business environments | Unauthorized access to computer systems for beneficial purposes | Illegal activities conducted using computer technology, such as hacking, fraud, and identity theft | The ethical guidelines for computer scientists and engineers | 12 | Which of the following is a common symptom of a malware infection? | Improved computer performance | Increased storage space availability | Unexplained changes to system settings or files | Reduced internet speed |