1 |
Which of the following viruses executes when starting the computer |
- A. Macro
- B. File infector
- C. Boot sector
- D. Salami shaving
|
2 |
Which is not a biometric technique. |
- A. Badge
- B. Face
- C. Retina
- D. Palm Print
|
3 |
How a virus reaches from one computer to another |
- A. Data is exchanged between computers
- B. Exchange of display screen
- C. Exchange of keyboard
- D. Exchange of printer
|
4 |
Which of the following is example of anti virus program |
- A. Norton
- B. Mca fee
- C. Dr.Solomon toolkit
- D. All
|
5 |
Which is not an antivirus program. |
- A. Noters
- B. Dr. Salman
- C. MCA fee
- D. Redlof
|
6 |
The example of antivirus is. |
- A. MCA Fee
- B. Trojan Horse
- C. Worm
- D. Logic bomb
|
7 |
The measurement of things such as finger print and retinal scans used for security access is called. |
- A. Copy right
- B. Eye retina
- C. Voice recognition
- D. Finger print
|
8 |
Software that is available free for a limited period is called |
- A. Free ware
- B. Group ware
- C. Share ware
- D. Vertical
|
9 |
Making illegal copies of copyrighted software is called; |
- A. Duplicate
- B. Backup
- C. Piracy
- D. Smuggling
|
10 |
The right to use the software on the computer is called |
- A. Software copyright
- B. Site license
- C. Software piracy
- D. None of the above
|