On This Page

This set of Fundamentals of Computers Multiple Choice Questions & Answers (MCQs) focuses on Fundamentals Of Computers Set 8

Q1 | A program that performs a useful task while simultaneously allowing destructive acts is
  • worm.
  • trojan horse.
  • virus.
  • macro virus.
Q2 | An intentionally disruptive program that spreads from program to program or from diskto disk is known as a:
  • trojan horse.
  • virus.
  • time bomb.
  • time-related bomb sequence.
Q3 | In 1999, the Melissa virus was a widely publicised:
  • e-mail virus.
  • macro virus.
  • trojan horse.
  • time bomb.
Q4 | What type of virus uses computer hosts to reproduce itself?
  • time bomb
  • worm
  • melissa virus
  • macro virus
Q5 | The thing that eventually terminates a worm virus is a lack of:
  • memory or disk space.
  • time.
  • cd drives space.
  • cd-rw.
Q6 | When a logic bomb is activated by a time-related event, it is known as a:
  • time-related bomb sequence.
  • virus.
  • time bomb.
  • trojan horse.
Q7 | A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
  • time-related bomb sequence.
  • virus.
  • time bomb.
  • trojan horse.
Q8 | What is the name of an application program that gathers user information and sends itto someone through the Internet?
  • a virus
  • spybot
  • logic bomb
  • security patch
Q9 | ------ is the measurement of things such as fingerprints and retinal scans used forsecurity access.
  • biometrics
  • bio measurement
  • computer security
  • smart weapon machinery
Q10 | What is the most common tool used to restrict access to a computer system?
  • user logins
  • passwords
  • computer keys
  • access-control software
Q11 | Hardware or software designed to guard against unauthorized access to a computernetwork is known as a(n):
  • hacker-proof program.
  • firewall.
  • hacker-resistant server.
  • encryption safe wall.
Q12 | The scrambling of code is known as:
  • encryption.
  • a firewall.
  • scrambling.
  • password proofing.
Q13 | To prevent the loss of data during power failures, use a(n):
  • encryption program.
  • surge protector.
  • firewall.
  • ups.
Q14 | ------Is defined as any crime completed through the use of computer technology.
  • computer forensics
  • computer crime
  • hacking
  • cracking
Q15 | ------ refers to electronic trespassing or criminal hacking.
  • cracking
  • jacking
  • spoofing
  • smarming
Q16 | The first electronic computer was developed by
  • j.v. attansoff
  • bill gates
  • simur cray
  • winton serf
Q17 | Snowbol is an/a---------
  • operating system
  • hll
  • software
  • search engine
Q18 | Switching device of fifth generation computer is--------
  • vacuum tubes
  • transistors
  • ic
  • vlsi
Q19 | ---------- computers operates essentially by counting
  • portable computer
  • hybrid computer
  • analog computer
  • digital computer
Q20 | ---------- computer is small general purpose micro computer, but larger than portablecomputer
  • hybrid
  • digital
  • desktop
  • laptop
Q21 | Cathode Ray Tube is a form of.......
  • keyboard
  • mouse
  • monitor
  • mother board
Q22 | Trackball is a...........
  • input device
  • output device
  • programming language
  • software
Q23 | ............. computer is a medium sized computer
  • micro
  • mainframe
  • super
  • mini
Q24 | ........... computer are of large size
  • micro
  • mainframe
  • super
  • mini
Q25 | Note book, laptop,palm,hand-held computers are coming under the category of.........computer
  • digital computer
  • mainframe computer
  • portable computer
  • hybrid computer