Virus and Antivirus... For all Competitive Examination with Important Mcqs asked in different Exams

preview_player
Показать описание
Topic: Crops of J and K
Do Support us and subscribe our YouTube channel and press the bell icon to receive notifications in future.
In order to see our previous lectures do click the below given links.

For internet and email click on the below link.

For Sustainable development Goals click the below link.

For climate of j and k click the below link,

For Crops in j and k,
Click the below link.

For formation of Constitution, click the link.

For cropping patterns and crops in India click the below link.

For centrally sponsored schemes click the below link

For important personalities and Current affairs click the below link.

For impt places in j and k click the below link.

Here are today's MCqs asked in different exams.

1. A......... is anything that can cause harm.
(1) vulnerability 2) phishing
(4) spoof (3) threat
Ans:Vulnerability.
2. A........ is a small program embedded inside of a GIF image.
(1) Web bug (3) spyware application
(2) cookie (4) spam
Ans: Spyware Application.
3. A hacker contacts your phone or E-mails and
attempts to acquire your password is called
(1) spoofing (4) buging
(2) phishing (3) spamming
Ans: Phishing
4. The unauthorised real-time interception of a private communication such as a phone call, instant message known as
• (1) Replay (2) Eavesdropping
• (3) Patches (4) Payloads
• Ans: Evasdropping.
• 5. Hackers often gain entry to a network be pretending to be at a legitimate computer
• (1) spoofing (2) forging
• (3) IP spoofing (4) All of these
• Ans: IP spoofing
• 6. The main reason to encrypt a file is to
• (1) reduce its size (2) secure it for transmission
• (3) prepare it for backup (4) include it in the start-up sequence.
• Ans: Secure it for Transmission
• 1. The first PC virus was developed in
• (1) 1980 (2) 1984
• (3) 1982 (4) 1988
• Ans: 1982
• 2. ......... are often delivered to PC through an E-mail attachment and are often designed to do harm
• (1) Viruses (2) Spams
• (3) Portals (4) E-mail messages
• Ans: Spams
• 3. The first computer virus is
• (1) Elk cloner (2) PARAM
• (3) the famous (4) HARLIE
• Ans: Elk Cloner
• 4. A time bomb occurs during a particular
• (1) data or time (2) logic and data
• (3) time (4) All of these
• Ans: Time
• 5. First boot sector virus is
• (1) computed (2) mind
• (3) brain (4) Elk Cloner
• Ans: Brain
• 6. Which virus spreads in application software
• (1) Macro virus (2) antivirus
• (3) digital signature (4) File virus
• Ans: Macro Virus
• 7. Some viruses have a delayed payload, which is sometimes called a
• (1) time (2) anti-virus
• (3) bomb (4) All of these
• Ans: Bomb
• 8. An antivirus is a
• (1) program code (2) computer
• (3) company name (4) application software
• Ans: Application Software
• 9. Like a virus, it is a self-replicating program. It also propagates through computer network.
• (1) Spyware (2) Worm
• (3) Cracker (4) Phishing scam.
• Ans: Phishing Scam
• 1. What is an E-mail attachment?
• (1) A receipt sent by the recipient
• (2) A separate document from another program sent along with an E-mail message
• (3) A malicious parasite that feeds off your messages and destroys the contents
• (4) A friend to whom E-mail is sent regularly
• Ans: 2
• 2. Password enables users to
• (1) get into the system quickly (2) make efficient use of time
• (3) retain confidentiality of files (4) None
• Ans: 3
• 3. ......... is the process of finding errors in software code?
• (1) Compiling (2) Testing
• (3) Running (4) Debugging
• Ans: Debugging
• 1. Antivirus software is an example of
• (1) business software (2) an operating system
• (3) a security (4) an office suite
• Ans: A security
• 2. Hackers
• (1) all have the same motive (2) is another name of users
• (3) Break into peoples computer.
• (4) are people who are allergic to computers
Ans” 3
.

You can mail me on my ID
For any confusion

Thank you and wishing you a happy life ahead....
Рекомендации по теме
Комментарии
Автор

Thnkuu way of teaching is too gud....3:phishing, 5: spoofing, 6:secure it for transmission

divyankachoudhary
Автор

Happy that YouTube learning made it so easy, to avail you equally available for anyone. Still, am getting jealous of the generation who belongs to your region. @dearsir The best thing about you is that, Whenever you teach, It doesn't looks like a burden or you are trying to sell things. Probably, all other channels from the region are like, they're reaching out, some kind of rat race, and even an half an hour session can spoil your day. But here, I felt a kind of mental therapy, peaceful mind and knowledge filled with happiness. Thank you so much :)

yodhyaclasses
Автор

Beech beech mai MCQs daal dena...itz jst awsm way to make students understand fully and this also is the another way to take a break during the lecture...

MindTreeNexus
Автор

Worth sharing and appreciable
Thanx sir

knowledgeseeker
Автор

May Almighty Allah bless you with good health and success

hidaqadri
Автор

Adorable way of teaching
kindly sir continue computer classes

mirmir
Автор

Putting mcq in between lecturer is the best way to understand a topic

pP-nhqk
Автор

Jazakallah sir g to providing valuable information ....
Phishing
Spoofing.

tabiyajan
Автор

Sir confusion in question 4..time bomb occur at a particular time....OR particular date and time.

ajayparihar
Автор

Thankew so much sir
Expect more videos from you !!!😊👌

sshreyasawhney
Автор

Apkay video sabsay achay ha u tube par

Wgh
Автор

i have a little confusion regarding virus, , , is there is a separate virus software or it is automatically develop within opereating system, , and then this is spreading to other systms due to reasons u mentioned, and is it is crime to develop virus software....please

rayeesnajar
Автор

Arihant .. computer awareness.
But sir we want something more..

searchrounder
Автор

Amazing 🤙🤙🤙... please sir do share pdf files of these lectures on telegram group... Koi update nhi mil rahi hai uspe ... Do share uTube links as well on telegram channel.

MindTreeNexus
Автор

Aweome as always.
Dear sir what is the difference between phishing and spoofing it is not getting clear. Please clarify

arshaizad
Автор

thnx a lot sir...plzz provide all the lectures of computer pertaining to jkssb punchayat accounts assistant...

peerfida
Автор

Sir kya aap mujhe bata skte ho ki konse exam ma aya ha ki
Link virus is an example of

DailyBytes-
Автор

Sir is this enough for virus nd anti virus...plzzz do reply as I m preapering notes

Jkssbexamsmcq
Автор

Sir plz make complete playlist of lectures

davoodahmadshah
Автор

Sir for MCQ 4 . I think the answer must be date or time ...thatz option 1. Please do reply.

MindTreeNexus