Computer Ethics Test | Class 9 Computer Science
🛡️
🔒
⚖️
🔐

Computer Ethics Test

Class 9th – Computer Science (SNC) – Chapter 11
@2025 everexams.com
Paper Date:
Time: 60 minutes
Total Marks: 40
Paper Type: Objective + Subjective
Font Size:

Multiple Choice Questions 10×1=10

1 What does “responsible computer usage” include?
A Choosing the most expensive hardware
B Sharing your passwords with friends
C Being cautious about what you share online and protecting yourself and others
D Ignoring software updates
2 What is a key reason to avoid using outdated hardware?
A It improves internet speed
B It reduces electricity consumption
C It enhances software compatibility
D It increases security vulnerabilities
3 Which activity is part of “cyber hygiene”?
A Regularly updating antivirus software
B Sharing passwords with friends
C Using public Wi-Fi for banking
D Ignoring software updates
4 Which is an example of hardware?
A Microsoft Word
B Google Chrome
C CPU
D Operating system
5 What does “efficiency” in computer usage refer to?
A Completing tasks quickly and smoothly
B Using the cheapest hardware
C Installing as many apps as possible
D None of these
6 Which factor is critical for ensuring hardware safety?
A Choosing brightly colored devices
B Avoiding antivirus software
C Using devices with updated security features
D None of these
7 What is a recommended characteristic of a strong password?
A Using your birthdate
B Reusing the same password for multiple accounts
C Making it easy to guess
D Including a mix of letters, numbers, and symbols
8 What is a responsible practice for using social media?
A Posting your home address publicly
B Setting your account to “private” to limit viewers
C Using weak passwords
D None of these
9 What does a patent protect?
A Literature work
B Brand names
C New inventions or processes
D Website designs
10 What is an example of a patented item?
A A new type of smartphone design
B A novel
C A company logo
D A social media post

Short Answer Questions 10×2=20

i Why should you create strong, unique passwords for your accounts?
ii How can you protect yourself from harmful links and downloads?
iii Why is it a good idea to avoid using public Wi-Fi for sensitive transactions?
Security
Privacy
iv What are the three main factors to consider when selecting computer hardware and software?
v Explain the purpose of Two-Factor Authentication (2FA).
vi Name two types of malware that can infect a device through untrusted downloads.
vii Why is it important to adjust privacy settings on social media?
viii What is the benefit of using private browsing mode?
ix Who owns the copyright to a book: the author or the publisher?
x Define “intellectual property rights” in one sentence.

Detailed Answer Questions (Answer any 2) 2×5=10

1 Describe the steps you should take to ensure the safe operation of digital platforms and devices.

Key Areas: Password management, Software updates, Antivirus protection, Privacy settings, Secure connections

2 Write a Note on responsible computer usage and discuss the points: Safety, Efficiency and Compatibility.

Hint: Consider how these three factors work together for optimal and secure computer usage

3 Explain how patent protection encourages innovation. Provide an example of an invention that benefited from patent rights.