Computer Ethics And Cyber Security Book Back Questions

11th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Science

Time : 00:45:00 Hrs
Total Marks : 30
    5 x 1 = 5
  1. A computer network security that monitors and controls incoming and outgoing traffic is

    (a)

    cookies

    (b)

    virus

    (c)

    firewall

    (d)

    worms

  2. The process of converting cipher text to plain text is called

    (a)

    Encryption

    (b)

    Decryption

    (c)

    key

    (d)

    proxy server

  3. E-commerce means

    (a)

    electronic commerce

    (b)

    electronic data exchange

    (c)

    electric data exchange

    (d)

    electronic commercialization

  4. Distributing unwanted e-mail to other is called.

    (a)

    scam

    (b)

    spam

    (c)

    fraud

    (d)

    spoofing

  5. Legal recognition for transactions are carried out by

    (a)

    Electronic Data Interchange

    (b)

    Electronic Data Exchange

    (c)

    Electronic Data Transfer

    (d)

    Electrical Data Interchange

  6. 3 x 2 = 6
  7. Write a short note on cracking.

  8. Write two types of cyber attacks.

  9. What is a Cookie?

  10. 3 x 3 = 9
  11. Explain symmetric key encryption.

  12. What are the guidelines to be followed by any computer user?

  13. What are ethical issues? Name some.

  14. 2 x 5 = 10
  15. What is piracy? Mention the types of piracy? How can it be prevented?

  16. Write the different types of cyber attacks.

*****************************************

TN 11th Standard Computer Science free Online practice tests

Reviews & Comments about 11th Computer Science Unit 17 Computer Ethics And Cyber Security Book Back Questions

Write your Comment