More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
Which is not a virus?
Choose an answer
Trojan Horse
Logic Bomb
MCA fee
Red lof
Previous
Skip
Next
Question # 2
MAC fee is a data
Choose an answer
Virus
Antivirus
Warm
Hacker
Previous
Skip
Next
Question # 3
How a virus reaches from one computer to another
Choose an answer
Data is exchanged between computers
Exchange of display screen
Exchange of keyboard
Exchange of printer
Previous
Skip
Next
Question # 4
________is a software used for data compression
Choose an answer
Word
Excel
WinZip
Windows
Previous
Skip
Next
Question # 5
The right to use the software on the computer is
Choose an answer
Software
Permission
Law
None
Previous
Skip
Next
Question # 6
When the virus starts to impact on data, it is known as
Choose an answer
Virus attack
Virus infection
Virus removing
None
Previous
Skip
Next
Question # 7
What is a malicious program called that is activated when a specific set of conditions are met
Choose an answer
Trojan horse
Virus
Worm
Logic bomb
Previous
Skip
Next
Question # 8
Software is copyright of person who
Choose an answer
Purchase it
Sell it
Develop it
Store it
Previous
Skip
Next
Question # 9
Making Illegal copies of software is called.
Choose an answer
Brewing
Software threat
Software piracy
Collaboration
Previous
Skip
Next
Question # 10
An other name for antivirus softeare is.
Choose an answer
Worm
Trajan Horse
Vaccine
Redlof
Previous
Skip
Next
Question # 11
Additional copy of your data is called.
Choose an answer
Moving of data
Taking of data
Backup of data
Taking of data
Previous
Skip
Next
Question # 12
Making illegal copies of copy right software is called
Choose an answer
Software piracy
Collaboration
Browsing
Electronic distribution
Previous
Skip
Next
Question # 13
Freely distributed Software without violating copy right laws are called.
Choose an answer
share ware
Public Domain
Copy protected
None
Previous
Skip
Next
Question # 14
A virus that replicated itself is called a.
Choose an answer
Buy
Vaccine
Bomb
Worm
Previous
Skip
Next
Question # 15
The virus which activated n a specific data and time is called.
Choose an answer
Chemobel
Logic Bomb
Redlof
Trojen Horse
Previous
Skip
Next
Question # 16
Which of the following is not a antivirus program
Choose an answer
Norton
McAfee
Redlof
Dr. Solman
Previous
Skip
Next
Question # 17
Which of the following is an antivirus.
Choose an answer
Rodlof
Logic bomb
NOD 32
Trojan Horse
Previous
Skip
Next
Question # 18
A person who gain illegal access to a computer system is called.
Choose an answer
Hacker
Worm
Pirats
User
Previous
Skip
Next
Question # 19
Trojan Horse is a type of.
Choose an answer
Virus
Antivirus
Horse
Hacker
Previous
Skip
Next
Question # 20
A secrat word or Number to be typed in on a key board before any activity can take place is called.
Choose an answer
Password
Biometric
Data encryption
Username
Previous
Skip
Next
Question # 21
Format C is an example of.
Choose an answer
Trojen Horse
Antivirus
Red lof
Logic Bomb
Previous
Skip
Next
Question # 22
The secret word or number used for protection is
Choose an answer
Biometric data
Back up
Password
Private
Previous
Skip
Next
Back