More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
__________________ is not a biometric technique.
Choose an answer
Face
Palm print
Bdge
Retina
Previous
Skip
Next
Question # 2
A right of person to keep his personal information away from the unauthorized access is called.
Choose an answer
Piracy
Privacy
Assets
Persoal issue
Previous
Skip
Next
Question # 3
Trojan Horse is a type of.
Choose an answer
Virus
Antivirus
Horse
Hacker
Previous
Skip
Next
Question # 4
A data bus with 32 lines can transfer which data at a time.
Choose an answer
32 bit
32 bytes
4 bytes
Both a and c
Previous
Skip
Next
Question # 5
Which of the following is not a antivirus program
Choose an answer
Norton
McAfee
Redlof
Dr. Solman
Previous
Skip
Next
Question # 6
Another name for Antivirus is.
Choose an answer
Vaccine
Worm
Cleaner software
Remover
Previous
Skip
Next
Question # 7
The secret word or number used for protection is
Choose an answer
Biometric data
Back up
Password
Private
Previous
Skip
Next
Question # 8
The example of antivirus is.
Choose an answer
MCA Fee
Trojan Horse
Worm
Logic bomb
Previous
Skip
Next
Question # 9
Which of the following is example of anti virus program
Choose an answer
Norton
Mca fee
Dr.Solomon toolkit
All
Previous
Skip
Next
Question # 10
Software that is used to detect and remove's the viruses from the compute ris called.
Choose an answer
Virus
Trojan Horse
pirated software
Antivirus
Previous
Skip
Next
Question # 11
Which is harmful for computer.
Choose an answer
Antivirus
Virus
Free ware
Share ware
Previous
Skip
Next
Question # 12
Which is not a biometric technique.
Choose an answer
Badge
Face
Retina
Palm Print
Previous
Skip
Next
Question # 13
Virus are transferred from one computer to another due to.
Choose an answer
Dust in room
Exchange of displaying screen
Exchange data and program
High temperature of room
Previous
Skip
Next
Question # 14
A person who gain illegal access to a computer system is called.
Choose an answer
Hacker
Worm
Pirats
User
Previous
Skip
Next
Question # 15
Additional copy of your data is called.
Choose an answer
Moving of data
Taking of data
Backup of data
Taking of data
Previous
Skip
Next
Question # 16
The measurement of things such as finger print and retinal scans used for security access is called.
Choose an answer
Copy right
Eye retina
Voice recognition
Finger print
Previous
Skip
Next
Question # 17
The right to use the software on the computer is
Choose an answer
Software
Permission
Law
None
Previous
Skip
Next
Question # 18
The virus which activated n a specific data and time is called.
Choose an answer
Chemobel
Logic Bomb
Redlof
Trojen Horse
Previous
Skip
Next
Question # 19
Which of the following is the most divesting loss to a computer.
Choose an answer
Loss of hardware
Loss of data
Loss of printout's
Loss of software
Previous
Skip
Next
Question # 20
Which is not an antivirus program.
Choose an answer
Noters
Dr. Salman
MCA fee
Redlof
Previous
Skip
Next
Question # 21
Which one is a secrat word that is used to prevent unauthorized access.
Choose an answer
Biometrics
Backup
Copyright
Password
Previous
Skip
Next
Question # 22
Which one is not virus.
Choose an answer
Mac fee
Logic bomb
Redlof
Trojen Horse
Previous
Skip
Next
Back