Top 250+ Solved General Informatics MCQ Questions Answer
Q. …………….. are programs that attach themselves to a computer or a file and then circulatethemselves to other files and to other computers on a network.
a. virus
b. logic bomb
c. web jacking
d. none of these
Q. In ……………… the hacker gains access and control over the web site of another.
a. web jacking
b. time theft
c. logic bomb
d. none of the above
Q. …………….are event dependent programs.
a. logic bombs
b. trojan bombs
c. salami attacks
d. none of these
Q. ……………………..is the process of coding and scrambling of messages to prevent unauthorizedaccess to or understanding of the data being transmitted.
a. encryption
b. firewalls
c. antivirus program
d. none of the above
Q. ……………………….refers to the compulsive Internet use which interferes with daily life, workand relationships.
a. cyber addictions
b. alcohol addiction
c. drug addiction
d. none of the above
Q. ……………………is a situation where an individual is given too much information and as aresult he is confused and cannot make optimal decisions.
a. information overload
b. cyber addiction
c. internet addiction
d. none of the above
Q. ……………….can be defined as electronic equipments or products which have becomeobsolete due to advancement in technology, changes in fashion, style and status andnearing the end of their useful life.
a. e-waste
b. toxic waste
c. computer waste
d. none of the above.
Q. Which chapter of the IT Act deals with computer related unlawful acts?
a. chapter x
b. chapter xi
c. chapter ix
d. chapter viii
Q. Linux is a …………
a. database program
b. application program
c. operating system
d. none of the above
Q. This is a software that is distributed under a licensing arrangement and which allows thecomputer code to be shared, viewed and modified by other users and organisations.
a. free software
b. open source software
c. gnu
d. none of the above
Q. OpenSUSE a community distribution mainly sponsored by
a. redhat
b. novell
c. oracle
d. none of the above
Q. This is a storage location from which software packages may be retrieved and installed on acomputer.
a. software distribution
b. software repository
c. operating system
d. none of the above