1.
Which type of virus is hard to detect as it changes its own code to evade matching a virus signature?
Answer: Option 'B'
Polymorphic virus A polymorphic virus is a complicated computer virus that affects data types and functions. It is a self-encrypted virus designed to avoid detection by a scanner. Upon infection, the polymorphic virus duplicates itself by creating usable, albeit slightly modified, copies of itself.
2.
_________ is the action of recording the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
Answer: Option 'C'
Keylogging Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.
3.
Which is the Software that translates and executes a high level language program one line at a time?
Answer: Option 'B'
Interpreter
4.
Computer programs are written in a high level programming language; however, the human-readable version of a program is called ____________.
Answer: Option 'C'
source code
5.
Errors in a computer program are referred to as
Answer: Option 'C'
Bugs
6.
Computer language COBOL is appropriate for—
Answer: Option 'A'
Commercial purpose COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.
7.
Which of the following is not a programming language ?
Answer: Option 'B'
Microsoft Office
8.
What is the software called which when get downloaded on computer scans your hard drive for personal information and your internet browsing habits?
Answer: Option 'D'
Spyware Spyware is malicious computer program that does exactly what its name implies-i.e., spies on you. After downloading itself onto your computer either through an email you opened, website you visited or a program you downloaded, spyware scans your hard drive for personal information and your internet browsing habits.
9.
What is Spyware?
Answer: Option 'D'
All of the above
10.
Which malicious program cannot do anything until actions are taken to activate the file attached by the malware?
Answer: Option 'C'
Virus
11.
Which TCP/IP transport layer protocol is faster?
Answer: Option 'C'
UDP-because it is connection-less
12.
UDP and TCP are categorized under the ___layer of the OSI model.
Answer: Option 'C'
Transport The transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the Open Systems Interconnection (OSI). The protocols of the layer provide host-to-host communication services for applications.
13.
DHCP is the abbreviation of _________.
Answer: Option 'B'
Dynamic Host Configuration Protocol
14.
In which generation did multi-programming start?
Answer: Option 'C'
Third generation Multi-programming started in third generation.
15.
Which of the following is the type of software that has self-replicating software that causes damage to files and system?
Answer: Option 'D'
Worms A worm is a type of virus that spreads through your computer by creating duplicates of itself on other drives, systems and networks.
16.
A simple automated program that scans the web for specific data and insert into a designated database is ________.
Answer: Option 'C'
Web crawler A web crawler (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner. This process is called Web crawling or spidering.
17.
Multi-user systems provide cost savings for small business as they use a single processing unit to link several ______.
Answer: Option 'C'
Dumb terminals A dumb terminal is a computer terminal that consists mostly of just a display monitor and a keyboard (and perhaps a mouse as well). It has no internal CPU (central processing unit), and thus has little or no processing power.
18.
Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
Answer: Option 'B'
Cold booting Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.
19.
__________are ‘attempts by individuals to obtain confidential information from you by falsifying their identity.
Answer: Option 'A'
phishing is a type of Internet fraud scam where the scammer sends email messages that appear to be from financial institutions or credit card companies that try to trick recipients into giving private information (i.e., username, password, account number, etc.).
20.
What type of web technology creates an online community where people can make statements and others can read and respond to those statements?
Answer: Option 'D'
A blog is a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.