1 |
A person who gain illegal access to a computer system is called. |
- A. Hacker
- B. Worm
- C. Pirats
- D. User
|
2 |
The example of antivirus is. |
- A. MCA Fee
- B. Trojan Horse
- C. Worm
- D. Logic bomb
|
3 |
Trojan Horse is a type of. |
- A. Virus
- B. Antivirus
- C. Horse
- D. Hacker
|
4 |
Format C is an example of. |
- A. Trojen Horse
- B. Antivirus
- C. Red lof
- D. Logic Bomb
|
5 |
__________________ is not a biometric technique. |
- A. Face
- B. Palm print
- C. Bdge
- D. Retina
|
6 |
Which of the following is an antivirus. |
- A. Rodlof
- B. Logic bomb
- C. NOD 32
- D. Trojan Horse
|
7 |
Software that is available free for a limited period is called; |
- A. Freeware
- B. Groupware
- C. Shareware
- D. Vertical
|
8 |
A secrat word or Number to be typed in on a key board before any activity can take place is called. |
- A. Password
- B. Biometric
- C. Data encryption
- D. Username
|
9 |
A special programme that can detect and remove virus from computer. |
- A. Free ware
- B. Shareware
- C. Antivirus
- D. Utility
|
10 |
The right to use the software on the computer is |
- A. Software
- B. Permission
- C. Law
- D. None
|