1 |
The right to use the software on the computer is called. |
Software copy right
Site license
Software iracy
Software privacy
|
2 |
A person who gain illegal access to a computer system is called. |
Hacker
Worm
Pirats
User
|
3 |
Which of the following is the most divesting loss to a computer. |
Loss of hardware
Loss of data
Loss of printout's
Loss of software
|
4 |
A right of person to keep his personal information away from the unauthorized access is called. |
Piracy
Privacy
Assets
Persoal issue
|
5 |
Security protection for personal computer include. |
Internal component
Lock and cables
Software
All of these
|
6 |
Making Illegal copies of software is called. |
Brewing
Software threat
Software piracy
Collaboration
|
7 |
Which of the following is an antivirus. |
Rodlof
Logic bomb
NOD 32
Trojan Horse
|
8 |
Trojan Horse is a type of. |
Virus
Antivirus
Horse
Hacker
|
9 |
Which of the following is not a antivirus program |
Norton
McAfee
Redlof
Dr. Solman
|
10 |
Another name for free software is. |
Public domain software
Copy protected software
Encrypted software
Share ware
|
11 |
How a virus reaches from on compute to another. |
Exchange of printer
Exchange of keyboard
Exchange of displaying screen
Data is exchanged between computers
|
12 |
Which is not cause of virus |
E Mail
Net work
Pirated software
Logic bomb
|
13 |
The secret word or number used for protection is |
Biometric data
Back up
Password
Private
|
14 |
Format C is an example of. |
Trojen Horse
Antivirus
Red lof
Logic Bomb
|
15 |
A program that detects the viruses, called. |
Virus
Groupware
Anti virus
Sahreware
|