Top 250+ Solved Fundamentals of Computers MCQ Questions Answer

From 166 to 180 of 220

Q. A modem is connected to

a. a telephone line

b. a keyboard

c. a printer

d. a monitor

  • a. a telephone line

Q. Large transaction processing systems in automated organisations use

a. online processing

b. batch processing

c. once-a-day processing

d. end-of-day processing

  • b. batch processing

Q. In a computer, most processing takes place in

a. memory

b. ram

c. motherboard

d. cpu

  • d. cpu

Q. . Which of the following is not a storage medium?

a. hard disk

b. flash drive

c. dvd

d. scanner

  • d. scanner

Q. The computer abbreviation KB usually means

a. key block

b. kernel boot

c. kilo byte

d. kit bit

  • c. kilo byte

Q. A program that performs a useful task while simultaneously allowing destructive acts is

a. worm.

b. trojan horse.

c. virus.

d. macro virus.

  • b. trojan horse.

Q. An intentionally disruptive program that spreads from program to program or from diskto disk is known as a:

a. trojan horse.

b. virus.

c. time bomb.

d. time-related bomb sequence.

  • b. virus.

Q. In 1999, the Melissa virus was a widely publicised:

a. e-mail virus.

b. macro virus.

c. trojan horse.

d. time bomb.

  • a. e-mail virus.

Q. What type of virus uses computer hosts to reproduce itself?

a. time bomb

b. worm

c. melissa virus

d. macro virus

  • b. worm

Q. The thing that eventually terminates a worm virus is a lack of:

a. memory or disk space.

b. time.

c. cd drives space.

d. cd-rw.

  • a. memory or disk space.

Q. When a logic bomb is activated by a time-related event, it is known as a:

a. time-related bomb sequence.

b. virus.

c. time bomb.

d. trojan horse.

  • c. time bomb.

Q. A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

a. time-related bomb sequence.

b. virus.

c. time bomb.

d. trojan horse.

  • c. time bomb.

Q. ------ is the measurement of things such as fingerprints and retinal scans used forsecurity access.

a. biometrics

b. bio measurement

c. computer security

d. smart weapon machinery

  • a. biometrics

Q. What is the most common tool used to restrict access to a computer system?

a. user logins

b. passwords

c. computer keys

d. access-control software

  • b. passwords
Subscribe Now

Get All Updates & News