Computers Basic MCQs Set-28

1
. The thing that eventually terminates a worm virus is a lack of:
  • Memory or disk space.
  • Time
  • CD drives space.
  • CD-RW
2
. When a logic bomb is activated by a time-related event, it is known as a:
  • Time-related bomb sequence.
  • Virus
  • Time bomb
  • Trojan horse
3
. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
  • Time-related bomb sequence.
  • Virus
  • Time bomb
  • Trojan horse
4
. What is the name of an application program that gathers user information and sends it to someone through the Internet?
  • A virus
  • Spybot
  • Logic bomb
  • Security patch
5
. —— is the measurement of things such as fingerprints and retinal scans used for security access.
  • Biometrics
  • Bio measurement
  • Computer security
  • Smart weapon machinery
6
. What is the most common tool used to restrict access to a computer system?
  • User logins
  • Passwords
  • Computer keys
  • Access-control software
7
. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
  • Hacker-proof program.
  • Firewall
  •  Hacker-resistant server.
  • Encryption safe wall
8
. The scrambling of code is known as:
  • Encryption
  • a firewall
  • Scrambling
  • Password proofing
9
. To prevent the loss of data during power failures, use a(n):
  • Encryption program
  • Surge protector
  • Firewall
  • UPS
10
. ——Is defined as any crime completed through the use of computer technology.
  • Computer forensics
  • Computer crime
  • Hacking
  • Cracking

 
Try Now Computer Fundamental MCQs based online Test/Quiz
Try Now Web Internet Fundamental MCQ based online test