Computer
Ethics and Cyber Security
Evaluation
PART - I
Choose the best Answer.
1. Which of the following deals
with procedures, practices and values?
a.
piracy
b.
programs
c.
virus
d. computer ethics
2. Commercial programs made
available to the public illegally are known as
a.
freeware
b. warez
c.
free software
d.
software
3. Which one of the following are
self-repeating and do not require a computer program to attach themselves?
a. viruses
b.
worms
c.
spyware
d.
Trojans
4. Which one of the following
tracks a user visits a website?
a.
spyware
b. cookies
c.
worms
d.
Trojans
5. Which of the following is not a
malicious program on computer systems?
a.
worms
d.
Trojans
c.
spyware
d. cookies
6. A computer network security that
monitors and controls incoming and outgoing traffic is
a.
Cookies
b.Virus
c. Firewall
d.
worms
7. The process of converting cipher
text to plain text is called
a.
Encryption
b. Decryption
c.
key
d.
proxy server
8. e-commerce means
a. electronic commerce
b.
electronic data exchange
c.
electric data exchange
d.
electronic commercialization.
9. Distributing unwanted e-mail to
others is called.
a.
scam
b. spam
c.
fraud
d.
spoofing
10. Legal recognition for
transactions are carried out by
a.
Electronic Data Interchange
b. Electronic Data Exchange
c.
Electronic Data Transfer
d.
Electrical Data Interchange
Related Topics
Privacy Policy, Terms and Conditions, DMCA Policy and Compliant
Copyright © 2018-2023 BrainKart.com; All Rights Reserved. Developed by Therithal info, Chennai.