More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
Which one is a secrat word that is used to prevent unauthorized access.
Choose an answer
Biometrics
Backup
Copyright
Password
Previous
Skip
Next
Question # 2
The right to use the software on the computer is called
Choose an answer
Software copyright
Site license
Software piracy
None of the above
Previous
Skip
Next
Question # 3
A right of person to keep his personal information away from the unauthorized access is called.
Choose an answer
Piracy
Privacy
Assets
Persoal issue
Previous
Skip
Next
Question # 4
When the virus starts to impact on data, it is known as
Choose an answer
Virus attack
Virus infection
Virus removing
None
Previous
Skip
Next
Question # 5
How a virus reaches from one computer to another
Choose an answer
Data is exchanged between computers
Exchange of display screen
Exchange of keyboard
Exchange of printer
Previous
Skip
Next
Question # 6
Which is not cause of virus
Choose an answer
E Mail
Net work
Pirated software
Logic bomb
Previous
Skip
Next
Question # 7
Software that is available free for a limited period is called
Choose an answer
Free ware
Group ware
Share ware
Vertical
Previous
Skip
Next
Question # 8
Which is not an antivirus program.
Choose an answer
Noters
Dr. Salman
MCA fee
Redlof
Previous
Skip
Next
Question # 9
A data bus with 32 lines can transfer which data at a time.
Choose an answer
32 bit
32 bytes
4 bytes
Both a and c
Previous
Skip
Next
Question # 10
The example of antivirus is.
Choose an answer
MCA Fee
Trojan Horse
Worm
Logic bomb
Previous
Skip
Next
Question # 11
Which of the following is computer virus
Choose an answer
Chernobal
Logic bomb
Redlof
All
Previous
Skip
Next
Question # 12
A virus that replicated itself is called a.
Choose an answer
Buy
Vaccine
Bomb
Worm
Previous
Skip
Next
Question # 13
Security protection for personal computers include:
Choose an answer
Internal Components
Lock and Cables
Software
All of these
Previous
Skip
Next
Question # 14
A person who gain illegal access to a computer system is called.
Choose an answer
Hacker
Worm
Pirats
User
Previous
Skip
Next
Question # 15
Software that is available free for a limited period is called;
Choose an answer
Freeware
Groupware
Shareware
Vertical
Previous
Skip
Next
Question # 16
Which of the following is not Antivirus program.
Choose an answer
NOD 32
Dr. Dalman
MCA free
Logic Bomb
Previous
Skip
Next
Back