0% found this document useful (0 votes)
15 views1 page

Chapter # 6

This document is a computer science examination paper for 1st Year students at Pak Garrison Higher Secondary School, consisting of multiple-choice questions related to computer viruses, software, and security. The paper is designed to assess students' knowledge on various topics including antivirus programs, data protection, and computer crimes. The maximum marks for the paper are 25, and it is to be completed in 10 minutes.

Uploaded by

azain01120225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views1 page

Chapter # 6

This document is a computer science examination paper for 1st Year students at Pak Garrison Higher Secondary School, consisting of multiple-choice questions related to computer viruses, software, and security. The paper is designed to assess students' knowledge on various topics including antivirus programs, data protection, and computer crimes. The maximum marks for the paper are 25, and it is to be completed in 10 minutes.

Uploaded by

azain01120225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

PAK GARRISON HIGHER SECONDARY SCHOOL

Housing Colony Nankana Sahib

Class: 1st Year Computer Science Maximum Marks: 25

Student Name:
Roll Number: ___________ Date of Paper: 08-03-2025
_______________

Section: ___________ Paper Type: Chapter # 6 Time Allowed: 10min

Q1. Choose the correct option. (25X1=25)


1. A virus program is usually hidden in:
(A) The operating system only (B) An application program only (C) The disk drive (D) The operating system or
application programs
2. Most computer crimes are committed by:
(A) Hackers (B) International spies (C) Highly trained computer (D) Company insiders who have no
consultants extraordinary technical ingenuity
3. Types of software that can be freely distributed without violating copyright laws are called:
(A) Shareware (B) Public domain (C) Copy protected (D) A and B
4. A virus that replicates itself is called a:
(A) Bug (B) Worm (C) Vaccine (D) Bomb
5. Another name for free software:
(A) Encrypted software (B) Copy protected software (C) Public domain software (D) Shareware
6. Another name for anti virus is:
(A) Vaccine (B) Worm (C) Trojan horse (D) DES
7. What is the most common computer crime of these listed below:
(A) Extortion of bank funds (B) IRS database sabotage (C) Putting Peoples on junk mailing (D) Software Piracy
lists
8. ............... is not a biometric technique:
(A) Badge (B) Retina (C) Face (D) Palm print
9. Which of the following is not antivirus program?
(A) NOD32 (B) Dr. Dalman (C) McAfee (D) Logic bomb
10. Viruses are transferred from one computer to another due to:
(A) Exchange data and program (B) Exchange of displaying (C) Dust in room (D) High temperature of room
11. Additional copy of your data is called:
(A) Backup of data (B) Taking of data (C) Moving of data (D) Forwarding of data
12. The example of antivirus is:
(A) McAfee (B) Trojan horse (C) Worm (D) Bomb
13. Format C is an example of:
(A) Antivirus (B) Logic bomb (C) Trojan horse (D) Redlof
14. Software that is available free for a limited period is called:
(A) Freeware (B) Shareware (C) Group ware (D) Network
15. Making illegal copies of copyrighted software is called:
(A) Piracy (B) Privacy (C) Replica (D) Register
16. A right of a person to keep his personal information away from the unauthorized access is called:
(A) Piracy (B) Privacy (C) Personal issue (D) Assets
17. Which of the following is the most devastating loss to a computer?
(A) Loss hardware (B) Loss of data (C) Loss of software (D) Loss of printouts
18. Which virus executes when starting the computer?
(A) Boot sector (B) Logic bomb (C) Trojan horse (D) Redlof
19. A computer virus is a:
(A) Disease (B) Software (C) Hardware (D) Bacteria
20. What is a computer virus?©
(A) A physical component of a (B) A type of software used for (C) Malicious code that can replicate (D) A device used for data Increased
computer gaming itself and infect a computer internet speed
21. Which of the following is not a common data breach technique?©
(A) Social engineering (B) Phishing (C) Encryption (D) Malware
22. Which of the following is an example of two-factor authentication?©
(A) A password and a fingerprint scan (B) A password and a username (C) A password and a security (D) A password and a CAPTCHA
question
23. Which of the following is an example of a physical security measure?©
(A) Two-factor authentication (B) Encryption (C) Firewall (D) Biometric authentication
24. What is the purpose of access control?©
(A) To prevent unauthorized access to (B) To prevent data loss (C) To encrypt data in transit (D) To secure physical servers
data
25. Which of the following is not protected by the Copyright Act?©
(A) Books (B) Paintings (C) Ideas (D) Computer software

You might also like