Practice Set 1 question answer - computer mcq Online Quiz (set-1) For All Competitive Exams

Q-1)   It is a toolkit for hiding the fact that a computer’s security has been compromised, is a general description of a set of programs which work to subvert control of an operating system from its legitimate (in accordance with established rules) operators.

(a)

(b)

(c)

(d)


Q-2)   Like a virus, it is a self-replicating program. It also propagates through computer network.

(a)

(b)

(c)

(d)

(e)


Q-3)   A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a

(a)

(b)

(c)

(d)

(e)

Explanation:

A hacker is an individual who uses a computer, networking or other skills to overcome a technical problem. The term also may refer to anyone who uses their abilities to gain unauthorised access to systems or networks in order to commit crimes. 


Q-4)   The first computer virus is

(a)

(b)

(c)

(d)

(e)

Explanation:

A creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage but to illustrate a mobile application


Q-5)   ____ are often delivered to PC through an E-mail attachment and are often designed to do harm.

(a)

(b)

(c)

(d)

(e)

Explanation:

The virus may come as an attachment along with the emails. When you open and run the attached file, you indirectly allow the virus into your computer system. This will slowly affect your hard drive and the entire system.


Q-6)   __________ are often delivered to a PC through an email attachment and are often designed to do harm.

(a)

(b)

(c)

(d)

(e)

Explanation:

A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk


Q-7)   First boot sector virus is

(a)

(b)

(c)

(d)

(e)

Explanation:

The Brain was a boot sector virus that was written on and for floppy disks and spread by the exchange of disks between users.  Microsoft MS-DOS-based computers and once installed would fill up the floppy, slamming its performance or rendering it useless.


Q-8)   You can protect sensitive data from prying eyes using ______

(a)

(b)

(c)

(d)

(e)


Q-9)   It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

(a)

(b)

(c)

(d)

(e)

Explanation:

The term ‘Virus’ stands for Vital Information Resources under Siege. A computer virus is a self-replicating program containing code that explicitly copies itself into other executable codes or programs.


Q-10)   Like a virus, it is also a self-replicating program. The difference between a virus and it is that a worm does not create copies of itself on one system: it propagates through computer networks.

(a)

(b)

(c)

(d)

Explanation:

The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagates through a computer network. What is that called a Worm