Computer mcqs
computer mcqs pdf
computer mcqs with answers
computer mcqs for PPSC pdf
computer mcqs for FPSC
computer mcqs online test
1: The common name for the crime of
stealing passwords is_____?
A.
Jacking.
B.
Identity theft.
C.
Spoofing.
D.
Hacking.
2: Collecting personal information and
effectively posing as another individual is known as the crime of______?
A.
Spooling.
B.
Identity
theft
C.
Spoofing.
D.
Hacking.
3: Malicious
software is known as______?
A.
Badware.
B.
Malware
C.
Maliciousware.
D.
Illegalware
4: A program that performs a useful
task while simultaneously allowing destructive acts is a_____?
A.
Worm.
B.
Trojan
horse
C.
Virus.
D.
Macro virus
5: An intentionally disruptive program
that spreads from program to program or from disk to disk is known as a______?
A.
Trojan horse.
B.
Virus
C.
Time bomb.
D.
Time-related bomb sequence.
6: In 1999, the Melissa virus was a
widely publicized: ______?
A.
E-mail
virus.
B.
Macro virus.
C.
Trojan horse.
D.
Time bomb.
7: What type of virus uses computer
hosts to reproduce itself?
A.
Time bomb
B.
Worm
C.
Melissa virus
D.
Macro virus
8: The thing that eventually terminates
a worm virus is a lack of:
A.
Memory or
disk space.
B.
Time.
C.
CD drives space.
D.
CD-RW.
9: When a logic bomb is activated by a
time-related event, it is known as a______?
A. Time-related bomb sequence.
B.
Virus.
C.
Time bomb.
D.
Trojan horse.
10: What is the name of an application
program that gathers user information and sends it to someone through the
Internet?
A.
A virus
B.
Spybot
C.
Logic bomb
D.
Security patch
Copyright© 2021 Jobs Trainer || Remember me in your prays
Computer mcqs for atomic energy
Computer mcqs for NAVY
Computer mcqs for PPSC
Computer mcqs for FPSC
Computer mcqs for ISSB
Computer mcqs for NTS
Computer mcqs for OTS
PAEC Computer mcqs
0 Comments
if you have any questions then you can ask in the comment section below