11th class Computer unit 6 MCQs
chapter 6 MCQs 11th Class computer
Security Copyright and the Law:
1. A virus program is usually hidden in:
a. The disk drive
b. The operating system only
c. The operating system or application programs
d. An application program only
2. Another name for antivirus is:
a. Trojan horse
b. Vaccine
c. DES
d. Worm
3. A virus that replicates itself is called a:
a. Vaccine
b. Bug
c. Bomb
d. Worm
4. Trojan Horse is a type of:
a. Software
b. Antivirus
c. Horse
d. Virus
5. Which of the following is an antivirus?
a. NOD 32
b. Redlof
c. Trojan horse
d. Logic bomb
6. A program that interferes with the normal working of a computer is called:
a. Freeware
b. Virus
c. Bacteria
d. Antivirus
7. A virus that replicates itself is called:
a. Vaccine
b. Buy
c. Bomb
d. Worm
8. Freely distributed software without violating copy-right laws are called:
a. Copy protected
b. Share ware
c. Public domain
d. None
9. ……… is not a biometric technique?
a. Palm print
b. Badge
c. Face
d. Retina
10. The virus which activated on a specific data and time is called:
a. Redlof
b. Chernobal
c. Trojan Horse
d. Logic bomb
11. Which is not a biometric technique?
a. Face
b. Badge
c. Palm print
d. Retina
12. Trojan horse is a/an:
a. Software
b. Antivirus
c. Hardware
d. Virus
13. Which of the following is not antivirus program?
a. McAfee
b. NOD 32
c. Logic bomb
d. Dr. Dalman
14. A secret word or number to be typed in on a key board before any activity can take place is called?
a. Data encryption
b. Password
c. Biometric
d. Username
15. McAfee is a:
a. Hacker
b. Virus
c. Warm
d. Antivirus
16. Which one is not a virus?
a. McAfee
b. Trojan horse
c. Redlof
d. Logic bomb
17. Another name for antivirus is:
a. Cleaner software
b. Vaccine
c. Remover
d. Worm
18. Viruses are transferred from one computer to another due to:
a. Dust in room
b. Exchange data and program
c. High temperature of room
d. Exchange of displaying screen
19. Software that is used to detect and removes the viruses from the computer is called:
a. Trojan horse
b. Pirated software
c. Virus
d. Antivirus
20. Which one is a secret word that is used to prevent unauthorized access?
a. Copyright
b. Biometrics
c. Backup
d. Password
21. The measurement of things such as finger prints and retinal scans used for security access is called:
a. Computer security
b. Biometrics
c. Copyright
d. Bio measurement
22. ……… is not a biometric technique.
a. Eye retina
b. Finger print
c. Palm print
d. Voice recognition
23. Which is not an antivirus program?
a. Dr. Salman
b. Noters
c. McAfee
d. Redlof
24. Additional copy of your data is called:
a. Moving of data
b. Backup of data
c. Forwarding of data
d. Taking of data