More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
Which of the following is computer virus
Choose an answer
Chernobal
Logic bomb
Redlof
All
Previous
Skip
Next
Question # 2
Which media can be used for backup
Choose an answer
Floppy Diskette
Zip disk
Tape Device
All
Previous
Skip
Next
Question # 3
Which is not an antivirus program.
Choose an answer
Noters
Dr. Salman
MCA fee
Redlof
Previous
Skip
Next
Question # 4
Which of the following is an antivirus.
Choose an answer
Rodlof
Logic bomb
NOD 32
Trojan Horse
Previous
Skip
Next
Question # 5
Which is not cause of virus
Choose an answer
E Mail
Net work
Pirated software
Logic bomb
Previous
Skip
Next
Question # 6
Software that is available free for a limited period is called;
Choose an answer
Freeware
Groupware
Shareware
Vertical
Previous
Skip
Next
Question # 7
Security protection for personal computers include:
Choose an answer
Internal Components
Lock and Cables
Software
All of these
Previous
Skip
Next
Question # 8
Virus are transferred from one computer to another due to.
Choose an answer
Dust in room
Exchange of displaying screen
Exchange data and program
High temperature of room
Previous
Skip
Next
Question # 9
The example of antivirus is.
Choose an answer
MCA Fee
Trojan Horse
Worm
Logic bomb
Previous
Skip
Next
Question # 10
A virus replicates itself is called;
Choose an answer
Bug
Worm
Vaccine
Bomb
Previous
Skip
Next
Question # 11
The right to use the software on the computer is called.
Choose an answer
Software copy right
Site license
Software iracy
Software privacy
Previous
Skip
Next
Question # 12
Making illegal copies of copyrighted software is called;
Choose an answer
Duplicate
Backup
Piracy
Smuggling
Previous
Skip
Next
Question # 13
The extension of an executable file is
Choose an answer
Xis-
Doc-
Cxt-
Exe
Previous
Skip
Next
Question # 14
The measurement of things such as finger print and retinal scans used for security access is called.
Choose an answer
Copy right
Eye retina
Voice recognition
Finger print
Previous
Skip
Next
Question # 15
Trojen house is a
Choose an answer
Antivirus
Virus
Software
Hardware
Previous
Skip
Next
Back