ECAT Computer Science MCQ's Test For Full Book With Answers

ECAT Computer Science MCQ's Test For Full Book

Sr. # Questions Answers Choice
1 An additional and spare copy of data stored on storage media is called: Backup of data Copy of data Moving of data Additional data
2 Which of the following media can be used for backup? Floppy disk Zip disk Tape device All
3 Software that is available free fir a limited period is called: Freeware Groupware Shareware Vertical
4 Making illegal copies of copyrighted software is called: Software piracy Software Distribution Software browsing Software Hacking
5 Making illegal copies of copyrighted software is called: Software piracy Software Distribution Software browsing Software Hacking
6 Format C is an example of: Trolan horse Chernobvl Boot sector Logic bomb
7 Which moliclous program is activated when a specific set of conditions are met? Trolan horse Virus Worm Logic bomb
8 The extension of an executable file is: xls. doc. ext. exe,
9 Which of the following viruses executes when starting the computer? Macro File infector Boot sector None
10 The virus which deletes MS office files and disk partition information is called: Book sector Chernobvl Logic bomb Troain horse
11 Which of the following is a computer virus? Chernobvl Logic bomb Redlof All
12 Which one of the following is not a virus? Troian horse Logic bomb McAfee Redlof
13 Which of the following is harmful for computer: Antivirus Virus Shareware Freeware
14 How virus reaches from one computer to another: Data is exchanged between computers Exchange of display screen Exchange of keyboard Exchange of printer
15 Which of the following is not cause of virus: Email Networks Pirated software Logic bomb
16 Trolan horse is a type of: Antivirus Virus Software Horse
17 McAfee is an example of: Virus Antivirus Hacker Worm
18 A special program that can detect and remove viruses from computers is called: Virus Anti-virus Groupware Custom
19 A program that interfaces with normal working of a computer is called: Virus Anti-virus Freeware Bacteria
20 Computer virus is simply a: A disease Set of computer instruction or codes Type of bacteria Hardware component
21 Security protection for personal computers includes: Internal components Locks and cables Software All of these
22 Which of the following is an example of good password? None of a partner or spouse Name of a child or pet Word related to a job or hobby Combination of letters, numbers and symbols
23 The secret word or number used for protection is called: Bio-metric data Backup Password Private words
24 Which of the following is the most damaging loss to a company? Loss of hardware Loss of data Loss of software Loss of printouts
25 Which of the following is not a bio-metric technique? Badge Retina Palm print Face
26 Which of the following is an bio-metric technology for person identification? Access card Password Fingerprint PIN
27 Which of the following is an authentication methodology? Access cards Bio metrics PIN Piracv
28 The restricted access to the server computer room is a form of: Logical security Enterprise security Physical security User security
29 Protecting computers and the information they contain against unwanted access, damage, modification or destruction is called: Computer monitoring Electronic policing Audit control Computer security
30 The external devices that are connected to a computer are called: Buses Registers Peripherals Slots
Download This Set

Is this page helpful?