More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
Computer Science Ics Part 1 Chapter 6 Online Test MCQs With Answers
Question # 1
________is a software used for data compression
Choose an answer
Word
Excel
WinZip
Windows
Previous
Skip
Next
Question # 2
The measurement of things such as finger print and retinal scans used for security access is called.
Choose an answer
Copy right
Eye retina
Voice recognition
Finger print
Previous
Skip
Next
Question # 3
An other name for antivirus softeare is.
Choose an answer
Worm
Trajan Horse
Vaccine
Redlof
Previous
Skip
Next
Question # 4
When the virus starts to impact on data, it is known as
Choose an answer
Virus attack
Virus infection
Virus removing
None
Previous
Skip
Next
Question # 5
Which is not a virus?
Choose an answer
Trojan Horse
Logic Bomb
MCA fee
Red lof
Previous
Skip
Next
Question # 6
Which is not an antivirus program.
Choose an answer
Noters
Dr. Salman
MCA fee
Redlof
Previous
Skip
Next
Question # 7
Another name for Antivirus is.
Choose an answer
Vaccine
Worm
Cleaner software
Remover
Previous
Skip
Next
Question # 8
Making Illegal copies of software is called.
Choose an answer
Brewing
Software threat
Software piracy
Collaboration
Previous
Skip
Next
Question # 9
Format C is an example of.
Choose an answer
Trojen Horse
Antivirus
Red lof
Logic Bomb
Previous
Skip
Next
Question # 10
Which of the following is an antivirus.
Choose an answer
Rodlof
Logic bomb
NOD 32
Trojan Horse
Previous
Skip
Next
Question # 11
A special program that can detect and remove viruses from computer is called
Choose an answer
Virus
Anti-virus
Group ware
Custom
Previous
Skip
Next
Question # 12
The right to use the software on the computer is
Choose an answer
Software
Permission
Law
None
Previous
Skip
Next
Question # 13
Trojan Horse is a type of.
Choose an answer
Virus
Antivirus
Horse
Hacker
Previous
Skip
Next
Question # 14
A secrat word or Number to be typed in on a key board before any activity can take place is called.
Choose an answer
Password
Biometric
Data encryption
Username
Previous
Skip
Next
Question # 15
Another name of antivirus is:
Choose an answer
Vaccine
Worm
Trojan Horse
Des
Previous
Skip
Next
Question # 16
Which one is harmful for computers?
Choose an answer
Antivirus
Virus
Free ware
Shareware
Previous
Skip
Next
Question # 17
Which media can be used for backup
Choose an answer
Floppy Diskette
Zip disk
Tape Device
All
Previous
Skip
Next
Question # 18
A secret word to be typed before any activity can take place
Choose an answer
Biometric data
Data encryption
Password
Wcode word
Previous
Skip
Next
Question # 19
Which of the following is computer virus
Choose an answer
Chernobal
Logic bomb
Redlof
All
Previous
Skip
Next
Question # 20
Which is not cause of virus
Choose an answer
E Mail
Net work
Pirated software
Logic bomb
Previous
Skip
Next
Question # 21
Making illegal copies of copyrighted software is called;
Choose an answer
Duplicate
Backup
Piracy
Smuggling
Previous
Skip
Next
Question # 22
The right of a person to keep his/her personal information away from others is called
Choose an answer
Privacy
Private
Secrecy
Right
Previous
Skip
Next
Back