[{"id":17661,"question":"Which of the following operating system is a GUI operating system:","choices":[{"text":"Windows","value":"A"},{"text":"Linux","value":"B"},{"text":"Solaris","value":"C"},{"text":"All of the above","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":17660,"question":"An operating system is a","choices":[{"text":"System utility","value":"A"},{"text":"Application software","value":"B"},{"text":"System software","value":"C"},{"text":"Software package","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":17659,"question":"An operating system performs:","choices":[{"text":"File-system management","value":"A"},{"text":"Hardware management","value":"B"},{"text":"User interface","value":"C"},{"text":"All of the above","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":17658,"question":"This is not a computer virus","choices":[{"text":"Norton","value":"A"},{"text":"Chernobyl","value":"B"},{"text":"Redlof","value":"C"},{"text":"All are computer virus","value":"D"},{"value":"E"}],"correctAnswer":1},{"id":17657,"question":"The software that is available free of cost is called:","choices":[{"text":"Shareware","value":"A"},{"text":"Freeware","value":"B"},{"text":"Firmware","value":"C"},{"text":"Copyright","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":17656,"question":"A spare copy of data on a secondary storage is called","choices":[{"text":"Store","value":"A"},{"text":"Backup","value":"B"},{"text":"Reference","value":"C"},{"text":"None of the above","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":17655,"question":"A computer cannot get a virus:","choices":[{"text":"Through the internet","value":"A"},{"text":"Through a virus infected person","value":"B"},{"text":"Through an infected floppy","value":"C"},{"text":"Through a pirated software CD","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":17654,"question":"There can be a complete backup of data or a (n),,,,,,,,,,,,,,backup of data:","choices":[{"text":"Full","value":"A"},{"text":"Incremental","value":"B"},{"text":"First","value":"C"},{"text":"Last","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":17653,"question":"Accidental data loss may be prevented by using a (n):","choices":[{"text":"Password","value":"A"},{"text":"Antivirus programs","value":"B"},{"text":"UPS","value":"C"},{"text":"All of the above","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":17652,"question":"What is the most common computer crime?","choices":[{"text":"Illegal transfer of bank funds","value":"A"},{"text":"Unauthorized access to personal databases","value":"B"},{"text":"Sending junk mails","value":"C"},{"text":"Software piracy","value":"D"},{"value":"E"}],"correctAnswer":4}]