Computer Ethics and Cyber Security Model Question Paper

11th Standard

    Reg.No. :
  •  
  •  
  •  
  •  
  •  
  •  

Computer Science

Time : 02:00:00 Hrs
Total Marks : 50
    6 x 1 = 6
  1. Which of the following deals with procedures, practices and values?

    (a)

    piracy

    (b)

    programs

    (c)

    virus

    (d)

    computer ethics

  2. Commercial programs made available to the public illegally are known as

    (a)

    freeware

    (b)

    vvarez

    (c)

    free softvvare

    (d)

    softvvare

  3. The process of converting cipher text to plain text is called

    (a)

    Encryption

    (b)

    Decryption

    (c)

    key

    (d)

    proxy server

  4. Distributing unwanted e-mail to other is called.

    (a)

    scam

    (b)

    spam

    (c)

    fraud

    (d)

    spoofing

  5. Which of the following is a communication media which is easily accessible and open to all?

    (a)

    TV

    (b)

    Mobile

    (c)

    Radio

    (d)

    Internet

  6. Which of the following is a crime which involves computer and network?

    (a)

    Phishing

    (b)

    Pharming

    (c)

    Hacking

    (d)

    Piracy

    (e)

    All of these

  7. 8 x 2 = 16
  8. What is harvesting?

  9. Write a short note on cracking.

  10. Write two types of cyber attacks.

  11. What is a Cookie?

  12. What is cyber crime?

  13. What is spoofing?

  14. What is virus?

  15. Define worms.

  16. 6 x 3 = 18
  17. What is the role of firewalls?

  18. Explain symmetric key encryption.

  19. What are ethical issues? Name some.

  20. Write a short note on ethics.

  21. Differentiate Spyware and Ransomware.

  22. What are the types of encryption?

  23. 2 x 5 = 10
  24. What are the various crimes happening using computer?

  25. Write the different types of cyber attacks.

*****************************************

TN 11th Standard Computer Science free Online practice tests

Reviews & Comments about 11th Standard Computer Science - Computer Ethics and Cyber Security Model Question Paper

Write your Comment