Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Computer Ethics / Virus / Hacking MCQs Online test for HST SST BPS16 & Other Jobs Online MCQs test

 Sindh Text Books/ Computer Ethics / Virus / Hacking MCQs Online test for HST SST BPS16 Sindh Commission & Other Jobs Online MCQs test.

Ethics Computer security & Hacking online test 👇
(i) Hacking

Hacking is perhaps the most common crime in the computer world.
Hackers can steal our WiFi, email or social media accounts' passwords.

Hackers also attack a website and take it down. However, the scope of hacking is much wider. The hackers can also steal sensitive information from government and business organizations, make fraudulent transactions and erase data on the cloud or network computers.

(ii) Credit and Debit Card Scam:

Keeping debit or credit cards is a common practice but insecure use of these cards can be dangerous. If a person has information about our debit or credit card he or she can make fraudulent transactions. There are various ways to get this information. One way is through scamming.

Scammers set small machines inside an ATM or credit card machine.
These machines copy the data which is then misused by the scammers. 
Debit and credit cards are also secured with PIN codes. User has to keep this code secret otherwise any person can use the card for online shopping and other purposes. All he or she needs to know our credit card number, PIN and security code printed on the back of the cards.

(iii) Phishing

Phishing is a method of trying to gather personal information using false e-mails and websites. In Phishing, perpetrators contact the target person through email, telephone or text message and pose as a legitimate and trusted 
 individual. He or she asks the target to provide sensitive data such as personally identifiable information, banking and credit card details and passwords for different reasons. The information is then used to access different accounts and can result in identity theft and financial loss.

(iv) Clickjacking

Have you ever seen any video tagged as "OMG? You won't believe what this boy has done!" or did you find a button on a website that asked to click to claim a reward you had never applied for? This is a kind of fraud which is called Clickjacking. Usually, culprits target children or novice internet users to click on a link containing malware or trick them into sharing private information via social media sites.

(v) Cyber Bullying or Harassment
Electronic means like a computer, mobile phone or internet are also used for online bullying or harassment. Harmful bullying behavior can include posting rumors, threats, passing inappropriate remarks, leaking personal information, blackmailing and committing hate speech. The perpetrator does it with the intent to cause harm to the victim. Victims may experience lower self-esteem, intent to commit suicide and a variety of negative emotional responses, including being scared, frustrated, angry and depressed.

5.1.4 Cyber Attack

Cyber-attacks occur when a cybercriminal uses computer or any device to launch attacks to other single or multiple computer networks.
The culprit tries to enter in a computer system and network through cracking, scam links, phishing or any other method. Generally cyber- attacks are committed for getting any benefit or causing harm to victim computer, network or websites. A cyber-attack either disables the targeted computer, deletes information or knocks it offline. It may also steal information from the computer or network.

5.2 MALWARE

The term malware is the contraction of malicious software. Malware is a broad term that encompasses computer viruses, worms, spyware, adware and others. Malware is a program that is written generally to cause a mess. They can be so dangerous that they can also damage devices. However commonly malware encrypt, steal or delete data, hijack core functions of computing and disturb different activities.

5.2.1 Different Malware

Types of malware can inchude computer viruses, worms, adware,
and spyware.

(1) Computer Virus

A computer virus is a computer program that can spread across computers and networks by making copies of itself, usually without the user's knowledge. It can also modify other computer programs, insert its own code and change computer settings. Viruses are harmful. They can range from displaying irritating messages to make all the documents inaccessible or even delete them. Viruses generally latch on a host file and when they execute they infect other files or programs. Boot Sector, Resident, Macro Viruses and File infector are some examples of viruses.

(ii) Worm

A computer worm spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction. does not need to attach itself to a file or program to cause damage. It can do several malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting fles, and consuming internal storage and memory resources.

(iii) Adware

Adware is advertising-supported software. They present endless ads and pop-up windows that could potentially consume memory and processing resources. Adware can also change the different settings of internet browsers like homepage and default search engine. Normally, these are not as dangerous as other malware. However, Adware annoys the user and slows down the processing. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in little windows that many not be closed. Adware programs include games, desktop toolbars or utilities. Commonly, adware is web-based and collects web browser data to target advertisements, especially pop-ups.

(iv) Spyware

Spyware is a malware that monitors a device and steals important information about a person or organization without their consent and sends such information to another person or organization. Spyware takes control over a mobile phone or computer without the user's knowledge.
They capture information like web browsing history, e-mail messages, usernames and passwords and online payment information. Spyware can
come through cookies or even when we install software without reading its terms and conditions. System monitors, cookies trackers, rootkits and key-loggers are few examples of Spyware.


Home




This post first appeared on , please read the originial post: here

Share the post

Computer Ethics / Virus / Hacking MCQs Online test for HST SST BPS16 & Other Jobs Online MCQs test

×

Subscribe to

Get updates delivered right to your inbox!

Thank you for your subscription

×