More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
How a virus reaches from one computer to another
Choose an answer
Data is exchanged between computers
Exchange of display screen
Exchange of keyboard
Exchange of printer
Previous
Skip
Next
Question # 2
Making illegal copies of copyrighted software is called;
Choose an answer
Duplicate
Backup
Piracy
Smuggling
Previous
Skip
Next
Question # 3
The virus which activated n a specific data and time is called.
Choose an answer
Chemobel
Logic Bomb
Redlof
Trojen Horse
Previous
Skip
Next
Question # 4
Trojen house is a
Choose an answer
Antivirus
Virus
Software
Hardware
Previous
Skip
Next
Question # 5
A person who gain illegal access to a computer system is called.
Choose an answer
Hacker
Worm
Pirats
User
Previous
Skip
Next
Question # 6
Security protection for personal computers include:
Choose an answer
Internal Components
Lock and Cables
Software
All of these
Previous
Skip
Next
Question # 7
Another name of for anti virus is
Choose an answer
Vaccine
Worm
Trojan horse
DES
Previous
Skip
Next
Question # 8
The right to use the software on the computer is
Choose an answer
Software
Permission
Law
None
Previous
Skip
Next
Question # 9
The example of antivirus is.
Choose an answer
MCA Fee
Trojan Horse
Worm
Logic bomb
Previous
Skip
Next
Question # 10
Which is not an antivirus program.
Choose an answer
Noters
Dr. Salman
MCA fee
Redlof
Previous
Skip
Next
Question # 11
Trojan Horse is a type of.
Choose an answer
Virus
Antivirus
Horse
Hacker
Previous
Skip
Next
Question # 12
Which of the following viruses executes when starting the computer
Choose an answer
Macro
File infector
Boot sector
Salami shaving
Previous
Skip
Next
Question # 13
Another name of antivirus is:
Choose an answer
Vaccine
Worm
Trojan Horse
Des
Previous
Skip
Next
Question # 14
Which one is a secrat word that is used to prevent unauthorized access.
Choose an answer
Biometrics
Backup
Copyright
Password
Previous
Skip
Next
Question # 15
Which of the following is example of anti virus program
Choose an answer
Norton
Mca fee
Dr.Solomon toolkit
All
Previous
Skip
Next
Back