1.
Which type of virus is hard to detect as it changes its own code to evade matching a virus signature?
Answer: Option 'B'
Polymorphic virus A polymorphic virus is a complicated computer virus that affects data types and functions. It is a self-encrypted virus designed to avoid detection by a scanner. Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself.
2.
_________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Answer: Option 'C'
Keylogging Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
3.
Which is the Software that translates and executes a high level language program one line at a time?
Answer: Option 'B'
Interpreter
4.
Computer programs are written in a high level programming language; however, the human-readable version of a program is called ____________.
Answer: Option 'C'
source code
5.
Errors in a computer program are referred to as
Answer: Option 'C'
Bugs
6.
Computer language COBOL is appropriate for—
Answer: Option 'A'
Commercial purpose COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.
7.
Which of the following is not a programming language ?
Answer: Option 'B'
Microsoft Office
8.
What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
Answer: Option 'D'
Spyware Spyware is malicious computer program that does exactly what its name implies-i.e., spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits.
9.
What is Spyware?
Answer: Option 'D'
All of the above
10.
Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
Answer: Option 'C'
Virus