JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
17. Computer Ethics And Cyber Security
XI COMPUTER SCIENCE TM TEST 17, choose the best answer
Prepared by S. Saminathan, GHSS - MUKHASAPARUR
https://sites.google.com/view/tn-computer-science/home/
Sign in to Google
to save your progress.
Learn more
* Indicates required question
NAME
*
Your answer
REGISTER NUMBER
*
Your answer
SCHOOL
*
Choose
GHSS MUKASAPARUR
OTHERS
1.Which of the following deals with procedures, practices and values?
*
1 point
virus
computer ethics
piracy
programs
2.Commercial programs made available to the public illegally are known as
*
1 point
free software
software
warez
freeware
3.Which one of the following are self-repeating and do not require a computer program to attach themselves?
*
1 point
spyware
Trojans
viruses
worms
4.Which one of the following tracks a user visits a website?
*
1 point
Trojans
spyware
worms
cookies
5.Which of the following is not a malicious program on computer systems?
*
1 point
cookies
spyware
worms
Trojans
6.A computer network security that monitors and controls incoming and outgoing traffic is
*
1 point
Firewall
virus
Cookies
worms
7.The process of converting cipher text to plain text is called
*
1 point
Encryption
proxy server
key
Decryption
8.e-commerce means
*
1 point
electric data exchange
electronic commercialization.
electronic data exchange
electronic commerce
9.Distributing unwanted e-mail to others is called.
*
1 point
fraud
spam
scam
spoofing
10.Legal recognition for transactions are carried out by
*
1 point
Electronic Data Interchange
Electronic Data Exchange
Electronic Data Transfer
Electrical Data Interchange
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. -
Terms of Service
-
Privacy Policy
Does this form look suspicious?
Report
Forms
Help and feedback
Contact form owner
Help Forms improve
Report