Toggle navigation
Terms & Conditions
Contact
Home
GK
Computer
TRB
TNPSC
Aptitude
English
Reasoning
Technical
Bank Exams
SSC
Engineering
Puzzles
Interview
GD Topics
Blogs
Online Test
Free computer quiz Online Test - MeritNotes
Home
Online Exam
No. of Questions :10
Remaining Time :
1. Hackers often gain entry to a network be pretending to be at a legitimate computer
(a)
IP spoofing
(b)
Forging
(c)
Spoofing
(d)
None of these
2. A hacker contacts your phone or E-mails and attempts to acquire your password is called
(a)
Spamming
(b)
Buging
(c)
Spoofing
(d)
Phishing
3. Resources are managed
(a)
By sophisticated locking mechanisms
(b)
More easily with multiple processors
(c)
By only one processor
(d)
With each processor equally
4. Opportunity for misuse when
(a)
Program written by one user and used by another user
(b)
Program written by one user
(c)
Program used by another user
(d)
None of these
5. A program designed to destroy data on your computer which can travel to infect other computers is called a _____
(a)
Virus
(b)
Disease
(c)
Hurricane
(d)
Torpedo
6. The most difficult problem with co-processors is
(a)
Keeping all processors busy
(b)
Managing shared resources
(c)
Finding suitable applications
(d)
Cost
7. _____ are often delivered to PC through an E-mail attachment and are often designed to do harm.
(a)
Email messages
(b)
Portals
(c)
Spam
(d)
Viruses
8. Control-unit busy
(a)
Can be prevented with more devices
(b)
Can be prevented by reducing the paging rate
(c)
Shows the availability of the path of devices
(d)
Is the same as device busy
9. Main motto of CAP system is
(a)
System provides him with no library of procedures to be used
(b)
Use of software capability has allowed them to relative considerable economics in formulating and implementing protection policies
(c)
Both (a) and (b)
(d)
None of these
10. Some viruses have delayed payload, which is sometimes called a
(a)
Bomb
(b)
Anti-virus
(c)
Time
(d)
All of these