17. Computer Ethics And Cyber Security
XI COMPUTER SCIENCE TM TEST 17, choose the best answer
 Prepared  by S. Saminathan, GHSS - MUKHASAPARUR 

Sign in to Google to save your progress. Learn more
NAME *
REGISTER NUMBER *
SCHOOL *
1.Which of the following deals with procedures, practices and values?
*
1 point
2.Commercial programs made available to the public illegally are known as
*
1 point
3.Which one of the following are self-repeating and do not require a computer program to attach themselves?
*
1 point
4.Which one of the following tracks a user visits a website?
*
1 point
5.Which of the following is not a malicious program on computer systems?
*
1 point
6.A computer network security that monitors and controls incoming and outgoing traffic is
*
1 point
7.The process of converting cipher text to plain text is called
*
1 point
8.e-commerce means *
1 point
9.Distributing unwanted e-mail to others is called.
*
1 point
10.Legal recognition for transactions are carried out by
*
1 point
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. - Terms of Service - Privacy Policy

Does this form look suspicious? Report