Free computer quiz Online Test - MeritNotes

No. of Questions :10
Remaining Time :
1. Abuse messaging systems to send unsolicited is
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

2. The phrase ____ describe viruses, worms, Trojan horse attack applets and attack scripts.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

3. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

4. The linking of computers with a communication system is called
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

5. Malicious access are unauthorized
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

6. A firewall
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

7. Encrypted passwords are used for
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

8. First boot sector virus is
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

9. A high paging rate
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

10. Link encryption
 
  • (a) 
  • (b) 
  • (c) 
  • (d)