Computer Awareness SET-32

Computer fundamental Awareness MCQs - Technical Aptitude #SET-32

Computer Fundamental Awareness MCQs

Welcome to our exclusive collections of Computer fundamental Awareness MCQ Questions and with answers. All questions are of multiple choice type. In these MCQs sets we are going to share most important questions related to Computer fundamental Awareness. These questions are very helpful for those candidates ans aspirants who are preparing for the various government and non government exam as well as in interview.These Mcqs are helpful in preparing exam like TET, CTET, JEE, AIPMT, PMT, Police exams ,army exams, CDSE , SBI Clerk , SBIPO, PO, RRB , IBPS PO , PSc, State PSC, Patwari, Samvida, Teacher recruitment test, UPSC, SSC, CGL, SI, CTET, TET, CDS, MAT , SSC 10+2 , CLAT , NIFT , SBI , IBPS Clerk, Vyapam etc

Computer fundamental Awareness MCQs - Technical Aptitude #SET-32


Question 311-320

Question : 311

Collecting personal information and effectively posing as another individual is known as the crime of:

[A].   Spooling
[B].   Identity Theft
[C].   Spoofing
[D].   Hacking


Question : 312

The scrambling of code is known as:

[A].   Encryption
[B].   A firewall
[C].   Scrambling
[D].   Password-proofing


Question : 313

Malicious software is known as:

[A].   Badware
[B].   Malware
[C].   Maliciousware
[D].   Illegalware


Question : 314

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):

[A].   Hacker-proof program
[B].   Firewall
[C].   Hacker-resistant server
[D].   Encryption safe wall


Question : 315

An intentionally disruptive program that spreads from program to program or from disk to disk is known as

[A].   Trojan horse
[B].   Virus
[C].   Time bomb
[D].   Time related bomb sequence


Question : 316

What is the most common tool used to restrict access to a computer system?

[A].   User log in
[B].   Passwords
[C].   Computer keys
[D].   Access-control software


Question : 317

In 1999, the Melissa virus was a widely publicized:

[A].   e-mail Virus
[B].   Macro virus
[C].   Trojan Horse
[D].   Time Bomb


Question : 318

__________ is the measurement of things such as fingerprints and retinal scans used for security access.

[A].   Biometrics
[B].   Biomeasurement
[C].   Computer security
[D].   Smart weapon machinery


Question : 319

A program that performs a useful task while simultaneously allowing destructive acts is:

[A].   Worm
[B].   Trojan Horse
[C].   Virus
[D].   Macro Virus


Question : 320

A digitizing tablet can be used for?

[A].   Tracing diagrams
[B].   Printing letters
[C].   Reading bar-codes
[D].   Playing





To Read Next Set
Click on below links



Please Read These Useful Post Also
कृपया इन्हें भी पढ़ें


MCQs Practice Sets for Sure Success in all competitive exams



If you are planning to qualify teacher eligibility test, TET, CTET, all India state TET, JEE Main, NEET UG, AIPMT, AIIMS, AFMC, DPMT, BHU, IP MBBS, JIPMER, State PMT, MHT , you can practice these question papers online. We have taken all the necessary care to provide you with genuine question papers and the answers from reliable sources. Hope our labors server student’s community in better way.

Visit  http://examsuccessmaster.blogspot.com/  for a complete list of exam quizzes e.g. Child development, Psychlogy, Inclusive Education, Social Studies, physics || general science MCQ, Himachal pradesh Gk, chemistry, physics, Mathematics, math, General science, computer basics, old question papers, environmental studies,Geography, Polity Social Issue, Social Science complete study material,aptitude tests, Practice sets,HPTET,Engineering Interview, Civil Engineering, Mechanical Engineering, Electrical Engineering, most frequently asked,tests,HPTET Questions and Answers, Engineering Multiple choice, MCQ Questions on various subjects and topics and much more.

No comments:

Post a Comment