Free computer quiz Online Test - MeritNotes

No. of Questions :10
Remaining Time :
1. Hackers often gain entry to a network be pretending to be at a legitimate computer
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

2. A hacker contacts your phone or E-mails and attempts to acquire your password is called
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

3. Resources are managed
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

4. Opportunity for misuse when
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

5. A program designed to destroy data on your computer which can travel to infect other computers is called a _____
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

6. The most difficult problem with co-processors is
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

7. _____ are often delivered to PC through an E-mail attachment and are often designed to do harm.
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

8. Control-unit busy
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

9. Main motto of CAP system is
 
  • (a) 
  • (b) 
  • (c) 
  • (d) 

10. Some viruses have delayed payload, which is sometimes called a
 
  • (a) 
  • (b) 
  • (c) 
  • (d)