Computer Science MCQs with Answer by General knowledge Solutions
1. Collecting
personal information and effectively posing as another individual is known as
the crime of:
- a. Spooling.
- b. Identity theft.
- c. Spoofing.
- d. Hacking.
2. Malicious software
is known as:
- a. Badware.
- b. Malware.
- c. Maliciousware.
- d. Illegalware.
3. A program that
performs a useful task while simultaneously allowing destructive acts is a:
- a. Worm.
- b. Trojan horse.
- c. Virus.
- d. Macro virus.
4. An intentionally
disruptive program that spreads from program to program or from disk to disk is
known as a:
- a. Trojan horse.
- b. Virus.
- c. Time bomb.
- d. Time-related bomb sequence.
5. In 1999, the
Melissa virus was a widely publicised:
- a. E-mail virus.
- b. Macro virus.
- c. Trojan horse.
- d. Time bomb.
6. What type of virus
uses computer hosts to reproduce itself?
- a. Time bomb
- b. Worm
- c. Melissa virus
- d. Macro virus
7. The thing that
eventually terminates a worm virus is a lack of:
- a. Memory or disk space.
- b. Time.
- c. CD drives space.
- d. CD-RW.
8. When a logic bomb
is activated by a time-related event, it is known as a:
- a. Time-related bomb sequence.
- b. Virus.
- c. Time bomb.
- d. Trojan horse.
9. A logic bomb that
was created to erupt on Michelangelo‘s birthday is an example of a:
- a. Time-related bomb sequence.
- b. Virus.
- c. Time bomb.
- d. Trojan horse.
10. What is the name
of an application program that gathers user information and sends it to someone
through the Internet?
- a. A virus
- b. Spybot
- c. Logic bomb
- d. Security patch
No comments