Computer Science

Computer Mcqs for PPSC

Computer Quiz # 9

Q1. ______ is the well-known name for the crime of stealing passwords.

(A) Jacking.
(B) Identity theft.
(C) Spoofing.
(D) Hacking.

Q2. Gathering personal information and pretending to be someone else is a ______________ crime?

(A) Spooling.
(B) Identity theft.
(C) Spoofing.
(D) Hacking.

Q3. Malicious software is known as____________?

(A) Badware.
(B) Malware.
(C) Maliciousware.
(D) Illegalware

Q4. A program that does a useful job while allowing malicious actions at the same time ____________?

(A) Worm.
(B) Trojan horse.
(C) Virus.
(D) Macro virus

Q5. A program that spreads from program to program or from disk to disk is known as a_____________?

(A) Trojan horse.
(B) Virus.
(C) Time bomb.
Time-related bomb sequence.

Computer Science

Q6.In 1999, the Melissa virus received a lot of attention was ____________?

(A) E-mail virus.
(B) Macro virus.
(C) Trojan horse.
(D) Time bomb.

Q7. What kind of virus do computer hosts use to replicate themselves?

(A) Time bomb
(B) Worm
(C) Melissa virus
(D) Macro virus

Q8. What ultimately puts an end to the worm virus is the lack of:

(A) Memory or disk space.
(B) Time.
(C) CD drives space.
(D) CD-RW.

Q9. When a logic bomb is triggered by a timing event, is it called _____?

(A) Time-related bomb sequence.
(B) Virus.
(C) Time bomb.
(D) Trojan horse.

Q10. What is the name of the application that collects user information and sends it to a person over the Internet?

(A) A virus
(B) Spybot
(C) Logic bomb
(D) Security patch

Basic Computer Mcqs

Q11. ____________ Are measurements such as fingerprints and retinal scans used for security access?

(A) Biometrics
(B) Bio measurement
(C) Computer security
(D) Smart weapon machinery

Q12. What are the simplest tools used to restrict access to a computer system?

(A) User logins
(B) Passwords
(C) Computer keys
(D) Access-control software

Q13. Hardware or software designed to protect against unauthorized access to computer networks, known as ___________?

(A) Hacker-proof program
(B) Firewall
(C) Hacker-resistant server
(D) Encryption safe wall

Q14. The password is known as ___?

(A) Encryption
(B) a firewall
(C) Scrambling
(D) Password proofing

Q15. To prevent the loss of data in the event of a power failure, use a(n)_____________?

(A) Encryption program
(B) Surge protector
(C) Firewall

Q16. __________is a crime committed using computer technology?

(A) Computer forensics
(B) Computer crime
(C) Hacking
(D) Cracking

Q17. ___________refers to electronic trespassing or criminal hacking?

(A) Cracking
(B) Jacking
(C) Spoofing
(D) Smarming

Q18. The first electronic computer was developed by____________?

(A) J.V. Atanasoff
(B) Bill Gates
(C) Simur Cray
(D) Winton Serf

Q19. _____________computers operates basically by counting?

(A) Portable computer
(B) Hybrid computer
(C) Analog computer
(D) Digital computer

Q20. ____________computer is a general-purpose minicomputer, but is it bigger than a laptop?

(A) Hybrid
(B) Digital
(C) Desktop
(D) Laptop