Submit MCQ
Everyday Science Mcqs (2021)
Math Solutions
Everyday Science Mcqs
Computer Mcqs
Computer Mcqs (754)
Math Solutions (1)
Go Back to Home
The first electronic computer was developed by____________?
J.V. Attansoff
Bill Gates
Simur Cray
Winton Serf
___________refers to electronic trespassing or criminal hacking?
Cracking
Jacking
Spoofing
Smarming
__________is defined as any crime completed through the use of computer technology?
Computer forensics
Computer crime
Hacking
Cracking
To prevent the loss of data during power failures, use a(n)_____________?
Encryption program
Surge protector
Firewall
UPS
The scrambling of code is known as___________?
Encryption
a firewall
Scrambling
Password proofing
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?
Hacker-proof program
Firewall
Hacker-resistant server
Encryption safe wall
What is the most common tool used to restrict access to a computer system?
User logins
Passwords
Computer keys
Access-control software
____________is the measurement of things such as fingerprints and retinal scans used for security access?
Biometrics
Bio measurement
Computer security
Smart weapon machinery
What is the name of an application program that gathers user information and sends it to someone through the Internet?
A virus
Spybot
Logic bomb
Security patch
When a logic bomb is activated by a time-related event, it is known as a____________?
Time-related bomb sequence.
Virus.
Time bomb.
Trojan horse.
The thing that eventually terminates a worm virus is a lack of:
Memory or disk space.
Time.
CD drives space.
CD-RW.
What type of virus uses computer hosts to reproduce itself?
Time bomb
Worm
Melissa virus
Macro virus
In 1999, the Melissa virus was a widely publicised:____________?
E-mail virus.
Macro virus.
Trojan horse.
Time bomb.
An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
Trojan horse.
Virus.
Time bomb.
Time-related bomb sequence.
A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Worm.
Trojan horse.
Virus.
Macro virus
Malicious software is known as____________?
Badware.
Malware.
Maliciousware.
Illegalware
Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Spooling.
Identity theft.
Spoofing.
Hacking.
The common name for the crime of stealing passwords is____________?
Jacking.
Identity theft.
Spoofing.
Hacking.
The typical computer criminal is a(n)____________?
Young hacker.
Trusted employee with no criminal record.
Trusted employee with a long, but unknown criminal record.
Overseas young cracker.
The computer abbreviation KB usually means____________?
Key Block
Kernel Boot
Kilo Byte
Kit Bit
Which of the following is not a storage medium?
Hard disk
Flash drive
DVD
scanner
Large transaction processing systems in automated organisations use___________?
Online processing
Batch Processing
Once-a-day Processing
End-of-day processing
A modem is connected to_____________?
a telephone line
a keyboard
a printer
a monitor
Which of the following contains permanent data and gets updated during the processing of transactions?
Operating System File
Transaction file
Software File
Master file
Which of the following is the smallest storage?
Megabyte
Gigabyte
Terabyte
None of these
«
1
...
103
104
105
106
107
108
109
...
112
»