Computer Ethics and Cyber Security Model Question Paper

11th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Applications

Time : 02:00:00 Hrs
Total Marks : 50
    9 x 1 = 9
  1. Which of the following deals with procedures, practices, and values?

    (a)

    piracy

    (b)

    programs

    (c)

    virus

    (d)

    computer ethics

  2. Which one of the following are self-repeating and do not require a computer program to attach themselves?

    (a)

    viruses

    (b)

    worms

    (c)

    spyware

    (d)

    Trojans

  3. Which of the following is not a malicious program on computer systems?

    (a)

    worms

    (b)

    Trojans

    (c)

    spyware

    (d)

    cookies

  4. A computer network security that monitors and controls incoming and outgoing traffic is

    (a)

    Cookies

    (b)

    Virus

    (c)

    Firewall

    (d)

    worms

  5. e-commerce means

    (a)

    electronic commerce

    (b)

    electronic data exchange

    (c)

    electric data exchange

    (d)

    electronic commercialization

  6. Distributing unwanted e-mail to others is called.

    (a)

    scam

    (b)

    spam

    (c)

    fraud

    (d)

    spoofing

  7. Legal recognition for transactions are carried out by

    (a)

    Electronic Data Interchange

    (b)

    Electronic Data Exchange

    (c)

    Electronic Data Transfer

    (d)

    Electrical Data Interchange

  8. Which of the following is a cirme which involves" computer and network?

    (a)

    Phishing

    (b)

    Pharming

    (c)

    Hacking

    (d)

    Piracy

    (e)

    All of these

  9. Which of the following is a set of moral principles that rule the behavior of individuals who use computers?

    (a)

    Cyber Crime

    (b)

    Ethics

    (c)

    Values

    (d)

    Mannerism

  10. 8 x 2 = 16
  11. What is harvesting?

  12. What are Warez?

  13. Write two types of cyber attacks.

  14. What is a Cookie?

  15. What is meant by computer Ethics?

  16. What is Salami Slicing?

  17. Write the types of software piracy?

  18. Name the types of cracking.

  19. 5 x 3 = 15
  20. What is the role of firewalls?

  21. Explain symmetric key encryption.

  22. What are ethical issues? Name some.

  23. Write note on unauthorized access

  24. Why web sites use cookies?

  25. 2 x 5 = 10
  26. What are the various crimes happening using computer?

  27. Write the different types of cyber attacks.

*****************************************

TN 11th Standard Computer Applications free Online practice tests

Reviews & Comments about 11th Computer Applications - Computer Ethics and Cyber Security Model Question Paper

Write your Comment