[{"id":17651,"question":"Another name for antivirus is","choices":[{"text":"Vaccine","value":"A"},{"text":"Worm","value":"B"},{"text":"Trojan horse","value":"C"},{"text":"DES","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":17650,"question":"A software used for data compression is called:","choices":[{"text":"Zip disk","value":"A"},{"text":"Norton Antivirus","value":"B"},{"text":"Winzip","value":"C"},{"text":"Dr. Solomon Toolkit","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":17649,"question":"Making illegal copies of copyrighted software is called:","choices":[{"text":"Copyleft","value":"A"},{"text":"Theft","value":"B"},{"text":"Piracy","value":"C"},{"text":"Either b or c","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":17648,"question":"Which of the following is the name of an antivirus?","choices":[{"text":"Trojan horse","value":"A"},{"text":"Dr. Solomon's Toolkit","value":"B"},{"text":"Logic bomb","value":"C"},{"text":"Redlof","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":17647,"question":"Which of the following statements is correct?","choices":[{"text":"A virus may destroy hardware","value":"A"},{"text":"A virus cannot read Pin code or Credit card number","value":"B"},{"text":"A virus may make resources unavailable to the users","value":"C"},{"text":"None of the above","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":17646,"question":"Which of the following virus deletes all Microsoft Office files and also the partition information from the disk?","choices":[{"text":"Trojan horse","value":"A"},{"text":"Logic bomb","value":"B"},{"text":"Chernobyl","value":"C"},{"text":"Redlof","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":17645,"question":"The virus attach itself to file which have the extension","choices":[{"text":".exe","value":"A"},{"text":".com","value":"B"},{"text":".dll","value":"C"},{"text":"Any of the above","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":17644,"question":"A removable media may be a:","choices":[{"text":"CD or DVD","value":"A"},{"text":"Flash memory","value":"B"},{"text":"Floppy disk","value":"C"},{"text":"Any of the above","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":17643,"question":"A virus program is usually hidden in:","choices":[{"text":"The operating system","value":"A"},{"text":"An application program","value":"B"},{"text":"The disk drive","value":"C"},{"text":"Any of the above","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":17642,"question":"Which of the following is the most serious problem?","choices":[{"text":"Loss of hardware","value":"A"},{"text":"Loss of data","value":"B"},{"text":"Loss of software","value":"C"},{"text":"None of the above","value":"D"},{"value":"E"}],"correctAnswer":2}]