Chapter 17: Computer Ethics and Cyber Security - Online Test

Q1. Which one of the following are self-repeating and do not require a computer program to attach themselves?
Answer : Option A
Explaination / Solution:
No Explaination.


Q2. Which one of the following tracks a user visits a website?
Answer : Option B
Explaination / Solution:
No Explaination.


Q3. Which of the following is not a malicious program on computer systems?
Answer : Option D
Explaination / Solution:
No Explaination.


Q4. A computer network security that monitors and controls incoming and outgoing traffic is
Answer : Option C
Explaination / Solution:
No Explaination.


Q5. The process of converting cipher text to plain text is called
Answer : Option B
Explaination / Solution:
No Explaination.


Q6. e-commerce means
Answer : Option A
Explaination / Solution:
No Explaination.


Q7. Distributing unwanted e-mail to others is called
Answer : Option B
Explaination / Solution:
No Explaination.


Q8. Legal recognition for transactions are carried out by
Answer : Option B
Explaination / Solution:
No Explaination.