More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
Security protection for personal computer include.
Choose an answer
Internal component
Lock and cables
Software
All of these
Previous
Skip
Next
Question # 2
The right to use the software on the computer is called
Choose an answer
Software copyright
Site license
Software piracy
None of the above
Previous
Skip
Next
Question # 3
Software that is available free for a limited period is called;
Choose an answer
Freeware
Groupware
Shareware
Vertical
Previous
Skip
Next
Question # 4
Making Illegal copies of software is called.
Choose an answer
Brewing
Software threat
Software piracy
Collaboration
Previous
Skip
Next
Question # 5
Format C is an example of.
Choose an answer
Trojen Horse
Antivirus
Red lof
Logic Bomb
Previous
Skip
Next
Question # 6
Which of the following is the most divesting loss to a computer.
Choose an answer
Loss of hardware
Loss of data
Loss of printout's
Loss of software
Previous
Skip
Next
Question # 7
A program that detects the viruses, called.
Choose an answer
Virus
Groupware
Anti virus
Sahreware
Previous
Skip
Next
Question # 8
Which media can be used for backup
Choose an answer
Floppy Diskette
Zip disk
Tape Device
All
Previous
Skip
Next
Question # 9
Which of the following is not a antivirus program
Choose an answer
Norton
McAfee
Redlof
Dr. Solman
Previous
Skip
Next
Question # 10
How a virus reaches from one computer to another
Choose an answer
Data is exchanged between computers
Exchange of display screen
Exchange of keyboard
Exchange of printer
Previous
Skip
Next
Question # 11
Another name for free software is.
Choose an answer
Public domain software
Copy protected software
Encrypted software
Share ware
Previous
Skip
Next
Question # 12
A data bus with 32 lines can transfer which data at a time.
Choose an answer
32 bit
32 bytes
4 bytes
Both a and c
Previous
Skip
Next
Question # 13
The secret word or number used for protection is
Choose an answer
Biometric data
Back up
Password
Private
Previous
Skip
Next
Question # 14
Which is not a biometric technique.
Choose an answer
Badge
Face
Retina
Palm Print
Previous
Skip
Next
Question # 15
Additional copy of your data is called.
Choose an answer
Moving of data
Taking of data
Backup of data
Taking of data
Previous
Skip
Next
Question # 16
A right of person to keep his personal information away from the unauthorized access is called.
Choose an answer
Piracy
Privacy
Assets
Persoal issue
Previous
Skip
Next
Back