11th Computer Science MCQ’s with Answers Chapter no 6 | 1st Year Computer Science Mcqs

Print/Downlaod pdf


We are providing accurate mcq questions for class 11 computer science chapter wise. You can read 1st year computer science mcqs with answers.

11th Computer Science MCQ’s with Answers Chapter no 111th Computer Science MCQ’s with Answers Chapter no 2
11th Computer Science MCQ’s with Answers Chapter no 311th Computer Science MCQ’s with Answers Chapter no 4
11th Computer Science MCQ’s with Answers Chapter no 511th Computer Science MCQ’s with Answers Chapter no 6
11th Computer Science MCQ’s with Answers Chapter no 711th Computer Science MCQ’s with Answers Chapter no 8
11th Computer Science MCQ’s with Answers Chapter no 911th Computer Science MCQ’s with Answers Chapter no 10
11th Computer Science MCQ’s with Answers Chapter no 1 | 1st Year Computer Science Mcqs

Chapter 6

Security Copyright And The Law

Encircle the most appropriate answer among the following options  choose which one is correct?

1          A virus program usually hidden in choose which one is correct?

  1. The operating system only
  2. An Application program only
  3. The disk drive
  4. The Operating system or application programs

2          A virus is just a choose which one is correct?

  1. Computer program
  2. Device driver
  3. hardware component
  4. None

3          A virus can destroy choose which one is correct?

  1. Executable program
  2. Keyboard
  3. CPU
  4. Display screen

4          Viruses are transferred from one computer to another due to choose which one is correct?

  1. Exchange of data and programs
  2. Exchange of display screen
  3. High temperature of room
  4. Dust in room

5          Most common crimes are committed by choose which one is correct?

  1. Hackers
  2. International spies
  3. Highly trained computer consultants
  4. Company insiders who have no extraordinary technical ingenuity.

6                  viruses infects the first sector of disk choose which one is correct?

  1. Boot sector virus
  2. Horse Trojan virus
  3. Chernobal virus
  4. Logic bomb virus

7                    virus is activated on the basis of a logical condition choose which one is correct?

  1. Boot sector virus
  2. Atomic bomb virus
  3. Chernobal virus
  4. Logic bomb virus

8          Format C is an example of virus choose which one is correct?

  1. Boot sector
  2. Trojan Horse
  3. Chernobal
  4. Logic bomb

9          Software that is used to detect and remove the viruses from the computer is called choose which one is correct?

  1. Pirated software
  2. Antivirus
  3. Trojan Horse
  4. Virus

10                is not an anti-virus program choose which one is correct?

  1. Red-lof
  2. Norton
  3. Dr. Solomon
  4. McAfee

11                  is an anti-virus program choose which one is correct?

  1. Red-lof
  2. Horse Trojan
  3. Dr. Solomon
  4. Logic bomb

12               is cause of virus choose which one is correct?

  1. e-mail
  2. Network
  3. Pirated software
  4. All

13        Types of software that can be freely distributed without violating copyright laws are called choose which one is correct?

  1. Shareware
  2. Public domain
  3. Copy protected
  4. Both a and b

14        Another name for antivirus is choose which one is correct?

  1. Vaccine
  2. Worm
  3. Trojan Horse
  4. DES

15        Security Protection for personal computer include choose which one is correct?

  1. Internal components
  2. Locks and cables
  3. Software
  4. All of these

16        A secret word or number to be typed by a keyboard before an activity can take place are called choose which one is correct?

  1. Biometric data
  2. Data encryption
  3. Password
  4. Private

17        Word Which is not an antivirus program?

  1. Redlof
  2. Norton
  3. McAfee
  4. Dr. Solomon

18.       Format C is an example of choose which one is correct?

  1. Logic bomb
  2. Trojon Horse
  3. Boot Sector
  4. Chernobal

19.       What is the most common computer crime of these listed below?

  1. Extortion of bank funds
  2. IRS database sabotage
  3. Putting people on junk mailing lists
  4. Software piracy

20                 media is used for backup choose which one is correct?

  1. Floppy diskette
  2. Zip Disk
  3. Tape drive
  4. All

21        Which Virus is activated on the basis of a logical condition?

  1. Logic bomb
  2. Trojon Horse
  3. Boot Sector
  4. Chernobal