Computer MCQs
Home Mcqs Computer MCQs

Computer MCQs

by Adeel Ikram
1 comment

Computer Science MCQs

Computer MCQs

Computer MCQs, Personal Computer System MCQs, MS Office, MS Excel, MSWord, MCQ on the Internet, MCQ Quiz, MCQ of Compact, NTS GAT, Personal Computer has become the Most Requirement able Item in any work Almost all departments have computer demand. Plus it every important to know the fundamental understanding of computer. If you prefer to get entrance or job related to laptop or pc, you have to prepare online for comps MCQ’S concerns and answers.

Most of the test conductors such as FPSC, NTS, KPPSC, PPSC and also others, are integrating pc knowledge MCQs in their evaluation patron. Having a very good command on the pc system is very necessary. Here are a few MCQs regarding the Pc from basic to advance will enable our subscribers to successfully procure high marks from your computer part of the examination.

MS Word ShortCUT Keys

MS Excel ShortCut Keys

MS PowerPoint Shortcut Keys


Malicious software is known as____________?

A. Badware.
B. Malware.
C. Maliciousware.
D. Illegalware

A program that performs a useful task while simultaneously allowing destructive acts is a___________?

A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus

What type of virus uses computer hosts to reproduce itself?

A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus

The thing that eventually terminates a worm virus is a lack of:

A. Memory or disk space.
B. Time.
C. CD drives space.
D. CD-RW.

When a logic bomb is activated by a time-related event, it is known as a____________?

A. Time-related bomb sequence.
B. Virus.
C. Time bomb.
D. Trojan horse.

What is the name of an application program that gathers user information and sends it to someone through the Internet?

A virus
B. Spybot
C. Logic bomb
D. Security patch

What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Access-control software

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________?

A. Hacker-proof program
B. Firewall
C. Hacker-resistant server
D. Encryption safe wall

The scrambling of code is known as___________?

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing

To prevent the loss of data during power failures, use a(n)_____________?

A. Encryption program
B. Surge protector
C. Firewall
D. UPS

1 comment

Muhammad Bachal Memon May 9, 2021 - 12:47 am

Computer operator

Reply

Leave a Comment