More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
The virus which activated n a specific data and time is called.
Choose an answer
Chemobel
Logic Bomb
Redlof
Trojen Horse
Previous
Skip
Next
Question # 2
Which of the following is computer virus
Choose an answer
Chernobal
Logic bomb
Redlof
All
Previous
Skip
Next
Question # 3
Software that is available free for a limited period is called;
Choose an answer
Freeware
Groupware
Shareware
Vertical
Previous
Skip
Next
Question # 4
The secret word or number used for protection is
Choose an answer
Biometric data
Back up
Password
Private
Previous
Skip
Next
Question # 5
A program that detects the viruses, called.
Choose an answer
Virus
Groupware
Anti virus
Sahreware
Previous
Skip
Next
Question # 6
What is a malicious program called that is activated when a specific set of conditions are met
Choose an answer
Trojan horse
Virus
Worm
Logic bomb
Previous
Skip
Next
Question # 7
Making illegal copies of copy right software is called
Choose an answer
Software piracy
Collaboration
Browsing
Electronic distribution
Previous
Skip
Next
Question # 8
A data bus with 32 lines can transfer which data at a time.
Choose an answer
32 bit
32 bytes
4 bytes
Both a and c
Previous
Skip
Next
Question # 9
Format C is an example of.
Choose an answer
Trojen Horse
Antivirus
Red lof
Logic Bomb
Previous
Skip
Next
Question # 10
The example of antivirus is.
Choose an answer
MCA Fee
Trojan Horse
Worm
Logic bomb
Previous
Skip
Next
Question # 11
Software is copyright of person who
Choose an answer
Purchase it
Sell it
Develop it
Store it
Previous
Skip
Next
Question # 12
Freely distributed Software without violating copy right laws are called.
Choose an answer
share ware
Public Domain
Copy protected
None
Previous
Skip
Next
Question # 13
A right of person to keep his personal information away from the unauthorized access is called.
Choose an answer
Piracy
Privacy
Assets
Persoal issue
Previous
Skip
Next
Question # 14
Another name for Antivirus is.
Choose an answer
Vaccine
Worm
Cleaner software
Remover
Previous
Skip
Next
Question # 15
Making illegal copies of copyrighted software is called;
Choose an answer
Duplicate
Backup
Piracy
Smuggling
Previous
Skip
Next
Question # 16
Another name of antivirus is:
Choose an answer
Vaccine
Worm
Trojan Horse
Des
Previous
Skip
Next
Question # 17
Software that is available free for a limited period is called
Choose an answer
Free ware
Group ware
Share ware
Vertical
Previous
Skip
Next
Question # 18
An other name for antivirus softeare is.
Choose an answer
Worm
Trajan Horse
Vaccine
Redlof
Previous
Skip
Next
Question # 19
The right of a person to keep his/her personal information away from others is called
Choose an answer
Privacy
Private
Secrecy
Right
Previous
Skip
Next
Question # 20
Which is not a biometric technique.
Choose an answer
Badge
Face
Retina
Palm Print
Previous
Skip
Next
Question # 21
Which is not an antivirus program.
Choose an answer
Noters
Dr. Salman
MCA fee
Redlof
Previous
Skip
Next
Question # 22
Security protection for personal computers include:
Choose an answer
Internal Components
Lock and Cables
Software
All of these
Previous
Skip
Next
Back