1 |
What is a malicious program called that is activated when a specific set of conditions are met |
Trojan horse
Virus
Worm
Logic bomb
|
2 |
The extension of an executable file is |
Xis-
Doc-
Cxt-
Exe
|
3 |
Which of the following viruses executes when starting the computer |
Macro
File infector
Boot sector
Salami shaving
|
4 |
Which of the following is computer virus |
Chernobal
Logic bomb
Redlof
All
|
5 |
How a virus reaches from one computer to another |
Data is exchanged between computers
Exchange of display screen
Exchange of keyboard
Exchange of printer
|
6 |
Which of the following is example of anti virus program |
Norton
Mca fee
Dr.Solomon toolkit
All
|
7 |
A special program that can detect and remove viruses from computer is called |
Virus
Anti-virus
Group ware
Custom
|
8 |
Which is not a kind of register |
Flag
Segment
Accumulator
Math coprocessor
|
9 |
A set of electrical paths used to transfer data is called |
Bus
Monitors
Computer clock
None of the above
|
10 |
A set of electrical paths used to transfer data is called |
Bus
Monitors
Computer clock
None
|
11 |
A bus line consists of |
Registers
Accumulators
Get of parallel lines
Computer clock
|
12 |
A bus that moves data between the central processor and memory is known as |
I/O bus
CPU bus
Processor buss
Data bus
|
13 |
CPU provides enabling signal through |
Control bus
Data bus
Address buss
Ordinary buss
|
14 |
All of the following may be stored in registers except |
Program instructions
Memory addresses
Data
CPU instruction set
|
15 |
Expansions slots connect interface cards to |
Ports
Peripheral devices
Mother board
System bus
|