MCQs on Viruses and Computer Security

MCQs on Viruses and Computer Security

1: Which antivirus is harmful to the computer?

A. shareware

B. anti virus

C.virus

D.freeware

E.All of these

F.None of these

Answer - Click Here:
C

2: Computer virus is simply meaning is _______________

A.hardware component

B. disease

C. set of computer instructions or code

D. Type of bacteria

E. All of these

F. None of these

Answer - Click Here:
C

3: Viruses enter the computer when computer starts is__________________.

A. salami shaving

B. macro

C. file infector

D. boot sector

E. All of these

F. None of these

Answer - Click Here:
D

4:  Computer anti virus program includes_______________ example of

A. Solomon toolkit

B. Norton

C. McAfee

D. Both A and B

E. All of these

F. None of these

Answer - Click Here:
E

5: Which of the following is Format command can’t be used for the setting?

A. alignment

B. line spacing

C. margins

D. tabs and indents

E. All of these

F. None of these

Answer - Click Here:
E
 

MCQs on Viruses and Computer Security – Continue.

6: Text is determined by amount of vertical space between lines of computer paragraph spacing

A.word spacing

B. line spacing

C. text spacing

D. All of these

E. None of these

Answer - Click Here:
B
   

7: ‘credit cards’ and ‘bank cards’ are examples of______________.

A. magnetic stripe

B. inked stripe

C. coded stripe

D. tagged stripe

E. All of these

F. None of these

Answer - Click Here:
A
   

8: Which Type of software which is designed for users to customize programs is

A. freeware

B. open-source software

C. shareware

D. macros

E. All of these

F. None of these

Answer - Click Here:
A
     

 

9: A Which of the following is a software that solves one task is

A. freeware program

B. suite

C. stand-alone program

D. open-source program

E. All of these

F. None of these

Answer - Click Here:
B
     

 

10: Worksheets and documents In a spreadsheet program, are present in__________.

A. workbook

B. column

C. cell

D. formula

E. All of these

F. None of these

Answer - Click Here:
A
     

MCQs on Viruses and Computer Security – Continue.

11: Power of spreadsheet lies in its which of the following.

A. formulas

B. worksheets

C. cells

D. labels

E. All of these

F. None of these

Answer - Click Here:
C
     

 

12: “Ctrl + O” short cut keys are used for which of the following command?

A. open a file

B. extract a file

C. open option

D. edit a file

E. All of these

F. None of these

Answer - Click Here:
A
   

 

13:  “Ctrl + S” short cut keys are used for which of the following command?

A. start file

B. play

C. save the current file

D. stop

E. All of these

F. None of these

Answer - Click Here:
B [/su_spoiler ]

 

14: Switching to the previous window from the current window can be done by shortcut keys which are the following is a correct statement.

A. Ctrl + Shift + Tab

B. Alt + Shift + Tab

C. home key

D. Alt + left arrow

E. All of these

F. None of these

Answer - Click Here:
B

15: “Ctrl + I” short cut keys are used for which of the following command?

A. change the Italic text in Arial

B. change selected text to be in Italics

C. change text in particle illusion

D. change selected text to be in the elite

E. All of these

F. None of these

Answer - Click Here:
B

MCQs on Viruses and Computer Security – Continue.

16: To run/execute the selected command, a key used is

A. Shift key

B. Ctrl key

C. Alt key

D. Enter key

E. All of these

F. None of these

Answer - Click Here:
D

17: Computer word size is a multiple of which of the following

A. 10 bits

B. 16 bits

C. 4 bits

D. 1024 bits

E. All of these

F. None of these

Answer - Click Here:
B

18: which of the following is not a  non-volatile?

A. RAM

B. ROM

C. PROM

D. flash memory

E. All of these

F. None of these

Answer - Click Here:
A

 

19: Computer memory is measured in terms of

A. bytes

B. cells

C. bits

D. units

E. All of these

F. None of these

Answer - Click Here:
C

 

20: Which of the following is a nibble is composed of

A. 4 bits

B. 8 bits

C. 2 bits

D. 6 bits

E. All of these

F. None of these

Answer - Click Here:
A

MCQs on Viruses and Computer Security – Continue.

21: Which of the following is an Internet protocol includes

A. MAC

B. Ethernet

C. ARCnet

D. TCP/IP

E.All of these

F. None of these

Answer - Click Here:
D

22: linked to the internet through the Computer which of the following is a correct statement

A. phone-line modem

B. DSL

C. cable modem

D. Both A and B

E. All of these

F. None of these

Answer - Click Here:
E

 

23: These are  all the top-level computer domains except

A. army

B. Edu

C. org

D. gov

E. All of these

F. None of these

Answer - Click Here:
A

24: Instruction steps which can be written within the diamond-shaped box, of a flowchart which of the following is a correct statement

A. DATA X, 4Z

B. S = B – C

C. IS A < 10

D. PRINT A

E. All of these

F. None of these

Answer - Click Here:
C

MCQs on Viruses and Computer Security – Continue.

25: Defined symbols is performed Resolution of externally by

A. assembler

B. linker

C. loader

D. compiler

E. All of these

F. None of these

Answer - Click Here:
B

26:  Rules out the use of GO TO which of following is used?

A. flow chart

B. Nassi-Shneiderman diagram

C. HIPO-DIAGRAMS

D. Pipe

E. All of these

F. None of these

Answer - Click Here:
B

27: Language processor includes which of the following?

A. assembler

B. compiler

C. interpreter

E. both A and C

D. All of these

E. None of these

Answer - Click Here:
E

28: Examples of system programs includes which of the following?

A. operating system of computer

B. trace program

C. compiler

D. Both A and D

E. All of these

F. None of these

Answer - Click Here:
E

29: System software’s are supplied by the______________.

A. inquiry programmers

B. text slots

C. payroll programmers

D. manufacturer

E. All of these

F. None of these

Answer - Click Here:
D

Topic Covered

MCQs on Viruses and Computer Security.

Computer Science Repeated MCQs Book Download