Live Education Quiz

9th Computer Science Chapter6 Computer Security and Ethics

Sr #QuestionsABCD
1

What does computer ethics primarily concern?

Ensuring computers operate efficiently Preventing unauthorized access to computer systems Guiding the moral conduct of individuals and organizations in computing-related activities Maximizing profits from computer technology
2

What does cyberbullying entail?

Ethical use of computer resources in educational settings Unauthorized access to computer systems for malicious purposes Harassment or intimidation of individuals using electronic communication, often through social media or online platforms The ethical guidelines for conducting research using computer technology
3

What is a potential consequence of ransomware infection?

Increased computer performance Loss of important data or files Enhanced system security Improved network speed
4

What is the best practice to protect a computer from malware?

Disable antivirus software Download software from untrusted sources Keep operating system and software up-to-date, use antivirus software, and exercise caution when browsing the internet or opening email attachments Share passwords with friends and family
5

How do computer viruses typically spread from one computer to another?

Through physical contact with infected hardware Through infected email attachments, malicious websites, or USB drives Through overheating of computer components Through electromagnetic interference
6

What is the main difference between a hacker and a cracker?

Hackers have malicious intent, while crackers seek to improve security. Hackers are skilled computer experts, while crackers are inexperienced. Hackers exploit vulnerabilities for personal gain, while crackers do so for altruistic reasons. Hackers are illegal, while crackers are legal.
7

What is a common method used by worms to spread across networks?

Attaching themselves to executable files Exploiting vulnerabilities in software to self-replicate and spread automatically Hiding within legitimate programs and waiting for specific conditions to execute Monitoring and collecting user information without their knowledge
8

What is the purpose of antivirus software?

To spread malware To detect and remove malware from computer systems To increase computer performance To encrypt data for secure transmission
9

Which of the following is an example of multimodal authentication?

Using a fingerprint and a password to unlock a device Using the same password for different accounts Using multiple devices to generate a one-time password Using a single authentication server for all users
10

What is multimodal authentication?

Authentication using multiple devices simultaneously Authentication using multiple biometric factors Authentication using multiple passwords Authentication using multiple authentication servers
11

Unauthorized access refers to:

Access granted to users with proper credentials Access denied to users without proper credentials Access granted to users without proper credentials Access denied to users with proper credentials
12

What is the advantage of biometric authentication over traditional password-based authentication?

Biometric authentication is less secure. Biometric authentication requires less processing power. Biometric authentication eliminates the need to remember passwords. Biometric authentication is easier to implement.