More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
The secret word or number used for protection is
Choose an answer
Biometric data
Back up
Password
Private
Previous
Skip
Next
Question # 2
What is a malicious program called that is activated when a specific set of conditions are met
Choose an answer
Trojan horse
Virus
Worm
Logic bomb
Previous
Skip
Next
Question # 3
Which one is harmful for computers?
Choose an answer
Antivirus
Virus
Free ware
Shareware
Previous
Skip
Next
Question # 4
A virus replicates itself is called;
Choose an answer
Bug
Worm
Vaccine
Bomb
Previous
Skip
Next
Question # 5
Which of the following is example of anti virus program
Choose an answer
Norton
Mca fee
Dr.Solomon toolkit
All
Previous
Skip
Next
Question # 6
An additional copy of your data stored on storage media is cell
Choose an answer
Backup of data
Taking of data
Moving the data
None of the above
Previous
Skip
Next
Question # 7
Freely distributed Software without violating copy right laws are called.
Choose an answer
share ware
Public Domain
Copy protected
None
Previous
Skip
Next
Question # 8
MCA fee is a;
Choose an answer
Virus
Antivirus
Hacker
Worm
Previous
Skip
Next
Question # 9
Another name for Antivirus is.
Choose an answer
Vaccine
Worm
Cleaner software
Remover
Previous
Skip
Next
Question # 10
Which of the following viruses executes when starting the computer
Choose an answer
Macro
File infector
Boot sector
Salami shaving
Previous
Skip
Next
Question # 11
An additional copy of your data on storage media is called;
Choose an answer
Backup data
Taking of data
Moving of data
None
Previous
Skip
Next
Question # 12
The extension of an executable file is
Choose an answer
Xis-
Doc-
Cxt-
Exe
Previous
Skip
Next
Question # 13
A program that detects the viruses, called.
Choose an answer
Virus
Groupware
Anti virus
Sahreware
Previous
Skip
Next
Question # 14
Making illegal copies of copyrighted software is called;
Choose an answer
Duplicate
Backup
Piracy
Smuggling
Previous
Skip
Next
Question # 15
The virus which activated n a specific data and time is called.
Choose an answer
Chemobel
Logic Bomb
Redlof
Trojen Horse
Previous
Skip
Next
Question # 16
Which of the following is the most divesting loss to a computer.
Choose an answer
Loss of hardware
Loss of data
Loss of printout's
Loss of software
Previous
Skip
Next
Back