Fundamentals Of Computers Set 8
On This Page
This set of Fundamentals of Computers Multiple Choice Questions & Answers (MCQs) focuses on Fundamentals Of Computers Set 8
Q1 | A program that performs a useful task while simultaneously allowing destructive acts is
- worm.
- trojan horse.
- virus.
- macro virus.
Q2 | An intentionally disruptive program that spreads from program to program or from diskto disk is known as a:
- trojan horse.
- virus.
- time bomb.
- time-related bomb sequence.
Q3 | In 1999, the Melissa virus was a widely publicised:
- e-mail virus.
- macro virus.
- trojan horse.
- time bomb.
Q4 | What type of virus uses computer hosts to reproduce itself?
- time bomb
- worm
- melissa virus
- macro virus
Q5 | The thing that eventually terminates a worm virus is a lack of:
- memory or disk space.
- time.
- cd drives space.
- cd-rw.
Q6 | When a logic bomb is activated by a time-related event, it is known as a:
- time-related bomb sequence.
- virus.
- time bomb.
- trojan horse.
Q7 | A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
- time-related bomb sequence.
- virus.
- time bomb.
- trojan horse.
Q8 | What is the name of an application program that gathers user information and sends itto someone through the Internet?
- a virus
- spybot
- logic bomb
- security patch
Q9 | ------ is the measurement of things such as fingerprints and retinal scans used forsecurity access.
- biometrics
- bio measurement
- computer security
- smart weapon machinery
Q10 | What is the most common tool used to restrict access to a computer system?
- user logins
- passwords
- computer keys
- access-control software
Q11 | Hardware or software designed to guard against unauthorized access to a computernetwork is known as a(n):
- hacker-proof program.
- firewall.
- hacker-resistant server.
- encryption safe wall.
Q12 | The scrambling of code is known as:
- encryption.
- a firewall.
- scrambling.
- password proofing.
Q13 | To prevent the loss of data during power failures, use a(n):
- encryption program.
- surge protector.
- firewall.
- ups.
Q14 | ------Is defined as any crime completed through the use of computer technology.
- computer forensics
- computer crime
- hacking
- cracking
Q15 | ------ refers to electronic trespassing or criminal hacking.
- cracking
- jacking
- spoofing
- smarming
Q16 | The first electronic computer was developed by
- j.v. attansoff
- bill gates
- simur cray
- winton serf
Q17 | Snowbol is an/a---------
- operating system
- hll
- software
- search engine
Q18 | Switching device of fifth generation computer is--------
- vacuum tubes
- transistors
- ic
- vlsi
Q19 | ---------- computers operates essentially by counting
- portable computer
- hybrid computer
- analog computer
- digital computer
Q20 | ---------- computer is small general purpose micro computer, but larger than portablecomputer
- hybrid
- digital
- desktop
- laptop
Q21 | Cathode Ray Tube is a form of.......
- keyboard
- mouse
- monitor
- mother board
Q22 | Trackball is a...........
- input device
- output device
- programming language
- software
Q23 | ............. computer is a medium sized computer
- micro
- mainframe
- super
- mini
Q24 | ........... computer are of large size
- micro
- mainframe
- super
- mini
Q25 | Note book, laptop,palm,hand-held computers are coming under the category of.........computer
- digital computer
- mainframe computer
- portable computer
- hybrid computer