filmov
tv
Virus and Antivirus... For all Competitive Examination with Important Mcqs asked in different Exams
Показать описание
Topic: Crops of J and K
Do Support us and subscribe our YouTube channel and press the bell icon to receive notifications in future.
In order to see our previous lectures do click the below given links.
For internet and email click on the below link.
For Sustainable development Goals click the below link.
For climate of j and k click the below link,
For Crops in j and k,
Click the below link.
For formation of Constitution, click the link.
For cropping patterns and crops in India click the below link.
For centrally sponsored schemes click the below link
For important personalities and Current affairs click the below link.
For impt places in j and k click the below link.
Here are today's MCqs asked in different exams.
1. A......... is anything that can cause harm.
(1) vulnerability 2) phishing
(4) spoof (3) threat
Ans:Vulnerability.
2. A........ is a small program embedded inside of a GIF image.
(1) Web bug (3) spyware application
(2) cookie (4) spam
Ans: Spyware Application.
3. A hacker contacts your phone or E-mails and
attempts to acquire your password is called
(1) spoofing (4) buging
(2) phishing (3) spamming
Ans: Phishing
4. The unauthorised real-time interception of a private communication such as a phone call, instant message known as
• (1) Replay (2) Eavesdropping
• (3) Patches (4) Payloads
• Ans: Evasdropping.
• 5. Hackers often gain entry to a network be pretending to be at a legitimate computer
• (1) spoofing (2) forging
• (3) IP spoofing (4) All of these
• Ans: IP spoofing
• 6. The main reason to encrypt a file is to
• (1) reduce its size (2) secure it for transmission
• (3) prepare it for backup (4) include it in the start-up sequence.
• Ans: Secure it for Transmission
• 1. The first PC virus was developed in
• (1) 1980 (2) 1984
• (3) 1982 (4) 1988
• Ans: 1982
• 2. ......... are often delivered to PC through an E-mail attachment and are often designed to do harm
• (1) Viruses (2) Spams
• (3) Portals (4) E-mail messages
• Ans: Spams
• 3. The first computer virus is
• (1) Elk cloner (2) PARAM
• (3) the famous (4) HARLIE
• Ans: Elk Cloner
• 4. A time bomb occurs during a particular
• (1) data or time (2) logic and data
• (3) time (4) All of these
• Ans: Time
• 5. First boot sector virus is
• (1) computed (2) mind
• (3) brain (4) Elk Cloner
• Ans: Brain
• 6. Which virus spreads in application software
• (1) Macro virus (2) antivirus
• (3) digital signature (4) File virus
• Ans: Macro Virus
• 7. Some viruses have a delayed payload, which is sometimes called a
• (1) time (2) anti-virus
• (3) bomb (4) All of these
• Ans: Bomb
• 8. An antivirus is a
• (1) program code (2) computer
• (3) company name (4) application software
• Ans: Application Software
• 9. Like a virus, it is a self-replicating program. It also propagates through computer network.
• (1) Spyware (2) Worm
• (3) Cracker (4) Phishing scam.
• Ans: Phishing Scam
• 1. What is an E-mail attachment?
• (1) A receipt sent by the recipient
• (2) A separate document from another program sent along with an E-mail message
• (3) A malicious parasite that feeds off your messages and destroys the contents
• (4) A friend to whom E-mail is sent regularly
• Ans: 2
• 2. Password enables users to
• (1) get into the system quickly (2) make efficient use of time
• (3) retain confidentiality of files (4) None
• Ans: 3
• 3. ......... is the process of finding errors in software code?
• (1) Compiling (2) Testing
• (3) Running (4) Debugging
• Ans: Debugging
• 1. Antivirus software is an example of
• (1) business software (2) an operating system
• (3) a security (4) an office suite
• Ans: A security
• 2. Hackers
• (1) all have the same motive (2) is another name of users
• (3) Break into peoples computer.
• (4) are people who are allergic to computers
Ans” 3
.
You can mail me on my ID
For any confusion
Thank you and wishing you a happy life ahead....
Do Support us and subscribe our YouTube channel and press the bell icon to receive notifications in future.
In order to see our previous lectures do click the below given links.
For internet and email click on the below link.
For Sustainable development Goals click the below link.
For climate of j and k click the below link,
For Crops in j and k,
Click the below link.
For formation of Constitution, click the link.
For cropping patterns and crops in India click the below link.
For centrally sponsored schemes click the below link
For important personalities and Current affairs click the below link.
For impt places in j and k click the below link.
Here are today's MCqs asked in different exams.
1. A......... is anything that can cause harm.
(1) vulnerability 2) phishing
(4) spoof (3) threat
Ans:Vulnerability.
2. A........ is a small program embedded inside of a GIF image.
(1) Web bug (3) spyware application
(2) cookie (4) spam
Ans: Spyware Application.
3. A hacker contacts your phone or E-mails and
attempts to acquire your password is called
(1) spoofing (4) buging
(2) phishing (3) spamming
Ans: Phishing
4. The unauthorised real-time interception of a private communication such as a phone call, instant message known as
• (1) Replay (2) Eavesdropping
• (3) Patches (4) Payloads
• Ans: Evasdropping.
• 5. Hackers often gain entry to a network be pretending to be at a legitimate computer
• (1) spoofing (2) forging
• (3) IP spoofing (4) All of these
• Ans: IP spoofing
• 6. The main reason to encrypt a file is to
• (1) reduce its size (2) secure it for transmission
• (3) prepare it for backup (4) include it in the start-up sequence.
• Ans: Secure it for Transmission
• 1. The first PC virus was developed in
• (1) 1980 (2) 1984
• (3) 1982 (4) 1988
• Ans: 1982
• 2. ......... are often delivered to PC through an E-mail attachment and are often designed to do harm
• (1) Viruses (2) Spams
• (3) Portals (4) E-mail messages
• Ans: Spams
• 3. The first computer virus is
• (1) Elk cloner (2) PARAM
• (3) the famous (4) HARLIE
• Ans: Elk Cloner
• 4. A time bomb occurs during a particular
• (1) data or time (2) logic and data
• (3) time (4) All of these
• Ans: Time
• 5. First boot sector virus is
• (1) computed (2) mind
• (3) brain (4) Elk Cloner
• Ans: Brain
• 6. Which virus spreads in application software
• (1) Macro virus (2) antivirus
• (3) digital signature (4) File virus
• Ans: Macro Virus
• 7. Some viruses have a delayed payload, which is sometimes called a
• (1) time (2) anti-virus
• (3) bomb (4) All of these
• Ans: Bomb
• 8. An antivirus is a
• (1) program code (2) computer
• (3) company name (4) application software
• Ans: Application Software
• 9. Like a virus, it is a self-replicating program. It also propagates through computer network.
• (1) Spyware (2) Worm
• (3) Cracker (4) Phishing scam.
• Ans: Phishing Scam
• 1. What is an E-mail attachment?
• (1) A receipt sent by the recipient
• (2) A separate document from another program sent along with an E-mail message
• (3) A malicious parasite that feeds off your messages and destroys the contents
• (4) A friend to whom E-mail is sent regularly
• Ans: 2
• 2. Password enables users to
• (1) get into the system quickly (2) make efficient use of time
• (3) retain confidentiality of files (4) None
• Ans: 3
• 3. ......... is the process of finding errors in software code?
• (1) Compiling (2) Testing
• (3) Running (4) Debugging
• Ans: Debugging
• 1. Antivirus software is an example of
• (1) business software (2) an operating system
• (3) a security (4) an office suite
• Ans: A security
• 2. Hackers
• (1) all have the same motive (2) is another name of users
• (3) Break into peoples computer.
• (4) are people who are allergic to computers
Ans” 3
.
You can mail me on my ID
For any confusion
Thank you and wishing you a happy life ahead....
Комментарии