Sail E0 Webinar

Computer Aptitude

COMPUTER FUNDAMENTAL MCQs

Fundamental And Concepts Of Computer

Total Questions : 1289 | Page 38 of 129 pages
Question 371. An intentionally disruptive program that spreads from program to program or from disk to disk is known as
  1.    Trojan horse
  2.    Virus
  3.    Time bomb
  4.    Time related bomb sequence
 Discuss Question
Answer: Option B. -> Virus
Question 372. Malicious software is known as:
  1.    Badware
  2.    Malware
  3.    Maliciousware
  4.    Illegalware
 Discuss Question
Answer: Option B. -> Malware
Question 373. Collecting personal information and effectively posing as another individual is known as the crime of:
  1.    Spooling
  2.    Identity Theft
  3.    Spoofing
  4.    Hacking
 Discuss Question
Answer: Option B. -> Identity Theft
Question 374. The common name for the crime of stealing passwords is:
  1.    Spooling
  2.    Identity theft
  3.    Spoofing
  4.    Hacking
 Discuss Question
Answer: Option C. -> Spoofing
Question 375. The majority of computer crimes are committed by:
  1.    Hackers
  2.    Insiders
  3.    Overseas criminals
  4.    Young teenage computer geniuses
 Discuss Question
Answer: Option B. -> Insiders
Question 376. A logic bomb that was created to erupt on Michelangelo's birthday is an example of a:
  1.    Time-related bomb sequence
  2.    Virus
  3.    Time bomb
  4.    Trojan horse
 Discuss Question
Answer: Option C. -> Time bomb
Question 377. When a logic bomb is activated by a time-related event, it is known as a:
  1.    Time-related bomb sequence
  2.    Virus
  3.    Time bomb
  4.    Trojan horse
 Discuss Question
Answer: Option C. -> Time bomb
Question 378. The thing that eventually terminates a worm virus is a lack of:
  1.    Memory or disk space
  2.    Time
  3.    CD drive space
  4.    CD-RW
 Discuss Question
Answer: Option A. -> Memory or disk space
Question 379. What is the name of an application program that gathers user information and sends it to someone through the Internet?
  1.    A virus
  2.    Spybot
  3.    Logic bomb
  4.    Security patch
 Discuss Question
Answer: Option B. -> Spybot
Question 380. HTML viruses infect:
  1.    Your computer
  2.    A Web page in the HTML code
  3.    Both a Web page and the computer that is viewing it.
  4.    None of these
 Discuss Question
Answer: Option B. -> A Web page in the HTML code

Latest Videos

Latest Test Papers