More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
Another name of antivirus is:
Choose an answer
Vaccine
Worm
Trojan Horse
Des
Previous
Skip
Next
Question # 2
A virus replicates itself is called;
Choose an answer
Bug
Worm
Vaccine
Bomb
Previous
Skip
Next
Question # 3
Software that is available free for a limited period is called
Choose an answer
Free ware
Group ware
Share ware
Vertical
Previous
Skip
Next
Question # 4
__________________ is not a biometric technique.
Choose an answer
Face
Palm print
Bdge
Retina
Previous
Skip
Next
Question # 5
A virus that replicates itself is called
Choose an answer
Bug
Warm
Vaccine
Bomb
Previous
Skip
Next
Question # 6
A program that detects the viruses, called.
Choose an answer
Virus
Groupware
Anti virus
Sahreware
Previous
Skip
Next
Question # 7
A virus that replicated itself is called a.
Choose an answer
Buy
Vaccine
Bomb
Worm
Previous
Skip
Next
Question # 8
Which of the following is computer virus
Choose an answer
Chernobal
Logic bomb
Redlof
All
Previous
Skip
Next
Question # 9
Freely distributed Software without violating copy right laws are called.
Choose an answer
share ware
Public Domain
Copy protected
None
Previous
Skip
Next
Question # 10
A special programme that can detect and remove virus from computer.
Choose an answer
Free ware
Shareware
Antivirus
Utility
Previous
Skip
Next
Question # 11
Which is not a biometric technique.
Choose an answer
Badge
Face
Retina
Palm Print
Previous
Skip
Next
Question # 12
Security protection for personal computer include.
Choose an answer
Internal component
Lock and cables
Software
All of these
Previous
Skip
Next
Question # 13
An other name for antivirus softeare is.
Choose an answer
Worm
Trajan Horse
Vaccine
Redlof
Previous
Skip
Next
Question # 14
A secrat word or Number to be typed in on a key board before any activity can take place is called.
Choose an answer
Password
Biometric
Data encryption
Username
Previous
Skip
Next
Question # 15
Format C is an example of.
Choose an answer
Trojen Horse
Antivirus
Red lof
Logic Bomb
Previous
Skip
Next
Back