Chapter 6 Notes | Chapter 6 MCQs Tests


Federal Board Class 9 Computer Science Chapter 6 MCQs solved.


Class 9 Computer Science Chapter 6 MCQs


1. What is a person who illegally breaks into others’ computer systems called?
A. Computer Engineer
B. System Programmer
C. Hacker
D. Cracker

2. What is a person who uses special tools for breaking into computer systems called?
A. Computer Engineer
B. System Programmer
C. Hacker
D. Cracker

3. Which malware spreads automatically in computer networks and replicates itself?
A. Virus
B. Worm
C. Adware
D. Spyware

4. Which of the following malware displays advertisements on the screen?
A. Virus
B. Worm
C. Adware
D. Trojan 

5. Which of the following authentication method is used for opening security gates?
A. Username and password
B. Personal Identification Number
C. Access card
D. Biometrics

6. Which of the following authentication method is most reliable?
A. Username and password
B. Personal Identification Number
C. Access card
D. Biometrics

7. Which of the following authentication method is based on features of individuals such as the face, fingerprint, and voice?
A. Username and password
B. Personal Identification Number
C. Access card
D. Biometrics

8. What is making illegal copies of copyright software for use on other computers or sale called?
A. Information privacy
B. Intellectual rights
C. Software piracy
D. Information ownership

9. Which of the following malware gathers information about user activities on a computer?
A. Virus
B. Worm
C. Adware
D. Spyware

10. Which of the following authentication methodology is used to draw cash from ATMs?
A. Username and password 
B. Personal Identification Number
C. Access card
D. Biometrics


Computer Science Chapter 6 MCQs

error: Content is protected !!