More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
Making Illegal copies of software is called.
Choose an answer
Brewing
Software threat
Software piracy
Collaboration
Previous
Skip
Next
Question # 2
An additional copy of your data stored on storage media is cell
Choose an answer
Backup of data
Taking of data
Moving the data
None of the above
Previous
Skip
Next
Question # 3
A virus that replicates itself is called
Choose an answer
Bug
Warm
Vaccine
Bomb
Previous
Skip
Next
Question # 4
Software that is used to detect and remove's the viruses from the compute ris called.
Choose an answer
Virus
Trojan Horse
pirated software
Antivirus
Previous
Skip
Next
Question # 5
A virus replicates itself is called;
Choose an answer
Bug
Worm
Vaccine
Bomb
Previous
Skip
Next
Question # 6
The right to use the software on the computer is called.
Choose an answer
Software copy right
Site license
Software iracy
Software privacy
Previous
Skip
Next
Question # 7
Freely distributed Software without violating copy right laws are called.
Choose an answer
share ware
Public Domain
Copy protected
None
Previous
Skip
Next
Question # 8
Which of the following is an antivirus.
Choose an answer
Rodlof
Logic bomb
NOD 32
Trojan Horse
Previous
Skip
Next
Question # 9
Which of the following viruses executes when starting the computer
Choose an answer
Macro
File infector
Boot sector
Salami shaving
Previous
Skip
Next
Question # 10
Which is not cause of virus
Choose an answer
E Mail
Net work
Pirated software
Logic bomb
Previous
Skip
Next
Question # 11
How a virus reaches from one computer to another
Choose an answer
Data is exchanged between computers
Exchange of display screen
Exchange of keyboard
Exchange of printer
Previous
Skip
Next
Question # 12
A data bus with 32 lines can transfer which data at a time.
Choose an answer
32 bit
32 bytes
4 bytes
Both a and c
Previous
Skip
Next
Question # 13
Which one is a secrat word that is used to prevent unauthorized access.
Choose an answer
Biometrics
Backup
Copyright
Password
Previous
Skip
Next
Question # 14
A program that detects the viruses, called.
Choose an answer
Virus
Groupware
Anti virus
Sahreware
Previous
Skip
Next
Question # 15
An additional copy of your data on storage media is called;
Choose an answer
Backup data
Taking of data
Moving of data
None
Previous
Skip
Next
Question # 16
How a virus reaches from on compute to another.
Choose an answer
Exchange of printer
Exchange of keyboard
Exchange of displaying screen
Data is exchanged between computers
Previous
Skip
Next
Back