More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
How a virus reaches from on compute to another.
Choose an answer
Exchange of printer
Exchange of keyboard
Exchange of displaying screen
Data is exchanged between computers
Previous
Skip
Next
Question # 2
A data bus with 32 lines can transfer which data at a time.
Choose an answer
32 bit
32 bytes
4 bytes
Both a and c
Previous
Skip
Next
Question # 3
The right to use the software on the computer is called.
Choose an answer
Software copy right
Site license
Software iracy
Software privacy
Previous
Skip
Next
Question # 4
The right of a person to keep his/her personal information away from others is called
Choose an answer
Privacy
Private
Secrecy
Right
Previous
Skip
Next
Question # 5
Which of the following is not a antivirus program
Choose an answer
Norton
McAfee
Redlof
Dr. Solman
Previous
Skip
Next
Question # 6
Another name of for anti virus is
Choose an answer
Vaccine
Worm
Trojan horse
DES
Previous
Skip
Next
Question # 7
An additional copy of your data stored on storage media is cell
Choose an answer
Backup of data
Taking of data
Moving the data
None of the above
Previous
Skip
Next
Question # 8
Security protection for personal computer include.
Choose an answer
Internal component
Lock and cables
Software
All of these
Previous
Skip
Next
Question # 9
Trojan Horse is a type of.
Choose an answer
Virus
Antivirus
Horse
Hacker
Previous
Skip
Next
Question # 10
Software that is used to detect and remove's the viruses from the compute ris called.
Choose an answer
Virus
Trojan Horse
pirated software
Antivirus
Previous
Skip
Next
Question # 11
The measurement of things such as finger print and retinal scans used for security access is called.
Choose an answer
Copy right
Eye retina
Voice recognition
Finger print
Previous
Skip
Next
Question # 12
A special program that can detect and remove viruses from computer is called
Choose an answer
Virus
Anti-virus
Group ware
Custom
Previous
Skip
Next
Question # 13
Freely distributed Software without violating copy right laws are called.
Choose an answer
share ware
Public Domain
Copy protected
None
Previous
Skip
Next
Question # 14
A person who gain illegal access to a computer system is called.
Choose an answer
Hacker
Worm
Pirats
User
Previous
Skip
Next
Question # 15
__________________ is not a biometric technique.
Choose an answer
Face
Palm print
Bdge
Retina
Previous
Skip
Next
Back