More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
A program that detects the viruses, called.
Choose an answer
Virus
Groupware
Anti virus
Sahreware
Previous
Skip
Next
Question # 2
Which of the following is computer virus
Choose an answer
Chernobal
Logic bomb
Redlof
All
Previous
Skip
Next
Question # 3
A virus that replicates itself is called
Choose an answer
Bug
Warm
Vaccine
Bomb
Previous
Skip
Next
Question # 4
An additional copy of your data stored on storage media is cell
Choose an answer
Backup of data
Taking of data
Moving the data
None of the above
Previous
Skip
Next
Question # 5
Trojan Horse is a type of.
Choose an answer
Virus
Antivirus
Horse
Hacker
Previous
Skip
Next
Question # 6
A secret word to be typed before any activity can take place
Choose an answer
Biometric data
Data encryption
Password
Wcode word
Previous
Skip
Next
Question # 7
Software is copyright of person who
Choose an answer
Purchase it
Sell it
Develop it
Store it
Previous
Skip
Next
Question # 8
A virus that replicated itself is called a.
Choose an answer
Buy
Vaccine
Bomb
Worm
Previous
Skip
Next
Question # 9
Which one is a secrat word that is used to prevent unauthorized access.
Choose an answer
Biometrics
Backup
Copyright
Password
Previous
Skip
Next
Question # 10
The measurement of things such as finger print and retinal scans used for security access is called.
Choose an answer
Copy right
Eye retina
Voice recognition
Finger print
Previous
Skip
Next
Question # 11
The right to use the software on the computer is called
Choose an answer
Software copyright
Site license
Software piracy
None of the above
Previous
Skip
Next
Question # 12
What is a malicious program called that is activated when a specific set of conditions are met
Choose an answer
Trojan horse
Virus
Worm
Logic bomb
Previous
Skip
Next
Question # 13
Additional copy of your data is called.
Choose an answer
Moving of data
Taking of data
Backup of data
Taking of data
Previous
Skip
Next
Question # 14
Software that is available free for a limited period is called;
Choose an answer
Freeware
Groupware
Shareware
Vertical
Previous
Skip
Next
Question # 15
Which of the following is an antivirus.
Choose an answer
Rodlof
Logic bomb
NOD 32
Trojan Horse
Previous
Skip
Next
Question # 16
Which of the following viruses executes when starting the computer
Choose an answer
Macro
File infector
Boot sector
Salami shaving
Previous
Skip
Next
Question # 17
Trojen house is a
Choose an answer
Antivirus
Virus
Software
Hardware
Previous
Skip
Next
Question # 18
A secrat word or Number to be typed in on a key board before any activity can take place is called.
Choose an answer
Password
Biometric
Data encryption
Username
Previous
Skip
Next
Question # 19
A person who gain illegal access to a computer system is called.
Choose an answer
Hacker
Worm
Pirats
User
Previous
Skip
Next
Question # 20
Which of the following is not a antivirus program
Choose an answer
Norton
McAfee
Redlof
Dr. Solman
Previous
Skip
Next
Question # 21
A data bus with 32 lines can transfer which data at a time.
Choose an answer
32 bit
32 bytes
4 bytes
Both a and c
Previous
Skip
Next
Question # 22
A virus replicates itself is called;
Choose an answer
Bug
Worm
Vaccine
Bomb
Previous
Skip
Next
Back