MCQs on Viruses and Computer Security
1: Which antivirus is harmful to the computer?
A. shareware
B. anti virus
C.virus
D.freeware
E.All of these
F.None of these
2:Â Computer virus is simply meaning is _______________
A.hardware component
B. disease
C. set of computer instructions or code
D. Type of bacteria
E. All of these
F. None of these
3:Â Viruses enter the computer when computer starts is__________________.
A. salami shaving
B. macro
C. file infector
D. boot sector
E. All of these
F. None of these
4:Â Computer anti virus program includes_______________ example of
A. Solomon toolkit
B. Norton
C. McAfee
D. Both A and B
E. All of these
F. None of these
5: Which of the following is Format command can’t be used for the setting?
A. alignment
B. line spacing
C. margins
D. tabs and indents
E. All of these
F. None of these
Â
MCQs on Viruses and Computer Security – Continue.
6:Â Text is determined by amount of vertical space between lines of computer paragraph spacing
A.word spacing
B. line spacing
C. text spacing
D. All of these
E. None of these
 Â
7:Â ‘credit cards’ and ‘bank cards’ are examples of______________.
A. magnetic stripe
B. inked stripe
C. coded stripe
D. tagged stripe
E. All of these
F. None of these
 Â
8:Â Which Type of software which is designed for users to customize programs is
A. freeware
B. open-source software
C. shareware
D. macros
E. All of these
F. None of these
  Â
9:Â A Which of the following is a software that solves one task is
A. freeware program
B. suite
C. stand-alone program
D. open-source program
E. All of these
F. None of these
  Â
10:Â Worksheets and documents In a spreadsheet program, are present in__________.
A. workbook
B. column
C. cell
D. formula
E. All of these
F. None of these
  Â
MCQs on Viruses and Computer Security – Continue.
11: Power of spreadsheet lies in its which of the following.
A. formulas
B. worksheets
C. cells
D. labels
E. All of these
F. None of these
  Â
12:Â “Ctrl + O” short cut keys are used for which of the following command?
A. open a file
B. extract a file
C. open option
D. edit a file
E. All of these
F. None of these
 Â
13:Â “Ctrl + S” short cut keys are used for which of the following command?
A. start file
B. play
C. save the current file
D. stop
E. All of these
F. None of these
15:Â “Ctrl + I” short cut keys are used for which of the following command?
A. change the Italic text in Arial
B. change selected text to be in Italics
C. change text in particle illusion
D. change selected text to be in the elite
E. All of these
F. None of these
MCQs on Viruses and Computer Security – Continue.
16: To run/execute the selected command, a key used is
A. Shift key
B. Ctrl key
C. Alt key
D. Enter key
E. All of these
F. None of these
17:Â Computer word size is a multiple of which of the following
A. 10 bits
B. 16 bits
C. 4 bits
D. 1024 bits
E. All of these
F. None of these
18: which of the following is not a  non-volatile?
A. RAM
B. ROM
C. PROM
D. flash memory
E. All of these
F. None of these
19:Â Computer memory is measured in terms of
A. bytes
B. cells
C. bits
D. units
E. All of these
F. None of these
20:Â Which of the following is a nibble is composed of
A. 4 bits
B. 8 bits
C. 2 bits
D. 6 bits
E. All of these
F. None of these
MCQs on Viruses and Computer Security – Continue.
21: Which of the following is an Internet protocol includes
A. MAC
B. Ethernet
C. ARCnet
D. TCP/IP
E.All of these
F. None of these
22: linked to the internet through the Computer which of the following is a correct statement
A. phone-line modem
B. DSL
C. cable modem
D. Both A and B
E. All of these
F. None of these
23: These are  all the top-level computer domains except
A. army
B. Edu
C. org
D. gov
E. All of these
F. None of these
24: Instruction steps which can be written within the diamond-shaped box, of a flowchart which of the following is a correct statement
A. DATA X, 4Z
B. S = B – C
C. IS A < 10
D. PRINT A
E. All of these
F. None of these
MCQs on Viruses and Computer Security – Continue.
25: Defined symbols is performed Resolution of externally by
A. assembler
B. linker
C. loader
D. compiler
E. All of these
F. None of these
26:Â Rules out the use of GO TO which of following is used?
A. flow chart
B. Nassi-Shneiderman diagram
C. HIPO-DIAGRAMS
D. Pipe
E. All of these
F. None of these
27: Language processor includes which of the following?
A. assembler
B. compiler
C. interpreter
E. both A and C
D. All of these
E. None of these
28: Examples of system programs includes which of the following?
A. operating system of computer
B. trace program
C. compiler
D. Both A and D
E. All of these
F. None of these
29:Â System software’s are supplied by the______________.
A. inquiry programmers
B. text slots
C. payroll programmers
D. manufacturer
E. All of these
F. None of these
Topic Covered
MCQs on Viruses and Computer Security.