It Module(150)
It Module(150)
1 Computer virus is ……
A) A hardware B) Windows tool C) A Computer D) A system
program software
2 The first computer virus is ……………..
A) Creeper B) Param C) The Famous D) Harle
3 A time bomb occurs during a particular ……..
A) Date or time B) Logic and data C) Only Time D) All
4 First boot sector virus is …………….
A) Computed B) Mind C) Brain D) Elk Cloner
5 …………… spreads in application software.
A) Macro Virus B) Boot Virus C) File Virus D) Antivirus
6 Some viruses have a delayed payload which is sometimes called a …………….
A) Time B) Antivirus C) Bomb D) All
7 An antivirus is a ……………….
A) Program Code B) Computer C) Company Name D) Application
8 Trend micro is a ……………..
A) Virus Program B) Antivirus Software C) Just A Program D) All
9 LE-Hard virus is effect of …………..
A) Command.com B) Friday 13 C) Hardware D) Software
10 It is a self-replicating program that infects computer and spreads by inserting copies of
itself into other executable code or documents.
A) Key Logger B) Virus C) Worm D) Cracker
11 Like a virus it is also self-replicating program. The difference between a virus and it is that
it propagates through computer network.
A) Cracker B) Worm C) Key Logger D) All
12 …………………are viruses that fool a user in downloading and executing them by
pretending to be useful applications.
A)Trojan Horses B) Key Logger C) Worm D) Cracker
13 Quick Heal is an example of ……..software.
A) OS B) Hardware C) Utility D) Virus
14 How many bits are there in ASCII code.
A) 18 B) 8 C) 10 D)16
15 DDE stands for …………………….
A) Dynamic Data B) Dynamic Data C) Dynamic Data D) None Of Above
Exchange Export Extension
16 In computer security, ………. means that computer system assets can be modified only by
authorized parities.
A) Confidentiality B) Integrity C) Availability D) Authenticity
17 Which of the following is independent malicious program that need no host program?
A) Trap doors B) Trojan horse C) Virus D) Worm
18 The …………….. is code embedded in some legitimate program that is set to “explode”
when certain conditions are met.
A) Trap doors B) Trojan horse C) Logic Bomb D) Virus
19 Which of the following malicious program do not replicate automatically?
A) Trojan Horse B) Virus C) Worm D) Zombie
20 A ………….. is a program that can infect other programs by modifying them. The
modification includes a copy of the virus program, which can infect other programs.
A) Worm B) Virus C) Zombie D) Trap doors
106 SENDING A FILE FROM YOUR PERSONAL COMPUTER'S PRIMARY MEMORY OR DISK TO
ANOTHER COMPUTER IS CALLED
108 WHAT TYPE OF CONNECTOR IS USED TO PLUG A TELEPHONE LINE INTO A MODEM?