1 |
The secret word or number used for protection is |
Biometric data
Back up
Password
Private
|
2 |
Format C is an example of. |
Trojen Horse
Antivirus
Red lof
Logic Bomb
|
3 |
A program that detects the viruses, called. |
Virus
Groupware
Anti virus
Sahreware
|
4 |
Which is harmful for computer. |
Antivirus
Virus
Free ware
Share ware
|
5 |
The example of antivirus is. |
MCA Fee
Trojan Horse
Worm
Logic bomb
|
6 |
A virus that replicated itself is called a. |
Buy
Vaccine
Bomb
Worm
|
7 |
Additional copy of your data is called. |
Moving of data
Taking of data
Backup of data
Taking of data
|
8 |
Which is not an antivirus program. |
Noters
Dr. Salman
MCA fee
Redlof
|
9 |
The measurement of things such as finger print and retinal scans used for security access is called. |
Copy right
Eye retina
Voice recognition
Finger print
|
10 |
Which one is a secrat word that is used to prevent unauthorized access. |
Biometrics
Backup
Copyright
Password
|
11 |
Software that is used to detect and remove's the viruses from the compute ris called. |
Virus
Trojan Horse
pirated software
Antivirus
|
12 |
Virus are transferred from one computer to another due to. |
Dust in room
Exchange of displaying screen
Exchange data and program
High temperature of room
|
13 |
A data bus with 32 lines can transfer which data at a time. |
32 bit
32 bytes
4 bytes
Both a and c
|
14 |
An other name for antivirus softeare is. |
Worm
Trajan Horse
Vaccine
Redlof
|
15 |
Which one is not virus. |
Mac fee
Logic bomb
Redlof
Trojen Horse
|