1 |
The example of antivirus is. |
- A. MCA Fee
- B. Trojan Horse
- C. Worm
- D. Logic bomb
|
2 |
Which is not a biometric technique. |
- A. Badge
- B. Face
- C. Retina
- D. Palm Print
|
3 |
What is a malicious program called that is activated when a specific set of conditions are met |
- A. Trojan horse
- B. Virus
- C. Worm
- D. Logic bomb
|
4 |
Which is harmful for computer. |
- A. Antivirus
- B. Virus
- C. Free ware
- D. Share ware
|
5 |
When the virus starts to impact on data, it is known as |
- A. Virus attack
- B. Virus infection
- C. Virus removing
- D. None
|
6 |
The extension of an executable file is |
- A. Xis-
- B. Doc-
- C. Cxt-
- D. Exe
|
7 |
Software that is used to detect and remove's the viruses from the compute ris called. |
- A. Virus
- B. Trojan Horse
- C. pirated software
- D. Antivirus
|
8 |
The right to use the software on the computer is |
- A. Software
- B. Permission
- C. Law
- D. None
|
9 |
An additional copy of your data on storage media is called; |
- A. Backup data
- B. Taking of data
- C. Moving of data
- D. None
|
10 |
Software that is available free for a limited period is called |
- A. Free ware
- B. Group ware
- C. Share ware
- D. Vertical
|