Computer Questions Practice Question and Answer8
Q:The germans calls this the 'spider monkey' and the italians call it the 'snail'.Which symbol is this? 2580 55b5cc7c1e4d2b41977750a2c5b5cc7c1e4d2b41977750a2c
Answer : 2. "@"
Answer: B) @ Explanation:
Q:Which of the following virus overtake computer system, when it boots and destroy information ? 3544 35b5cc6d4e4d2b4197774e5915b5cc6d4e4d2b4197774e591
- 1System infectorsfalseCorrectWrong
- 3Stealth virustrueCorrectWrong
- 4Boot infectorsfalseCorrectWrong
Answer : 3. "Stealth virus"
Answer: C) Stealth virus Explanation:
Q:Delayed payload of some viruses is also called as _____ 2292 15b5cc6d4e4d2b4197774e5875b5cc6d4e4d2b4197774e587
- 2Late - VirusfalseCorrectWrong
Answer : 1. "Bomb"
Answer: A) Bomb Explanation:
Q:The difference between a virus and a self-replicating program which is like a virus is that rather than creating copies of itself on only one system it propagate through computer network. What is that called as _____ 2538 25b5cc6d4e4d2b4197774e5825b5cc6d4e4d2b4197774e582
- 3Time BombfalseCorrectWrong
Answer : 2. "Worm"
Answer: B) Worm Explanation:
Q:What is the name of the virus that fool a user into downloading and executing them by pretending to be useful applications ? 1023 25b5cc6d1e4d2b4197774e3fc5b5cc6d1e4d2b4197774e3fc
- 1Trojan horsestrueCorrectWrong
- 4File virusfalseCorrectWrong
Answer : 1. "Trojan horses"
Answer: A) Trojan horses Explanation:
Q:Why ABC computer is called so ? 909 25b5cc6cbe4d2b4197774e0e05b5cc6cbe4d2b4197774e0e0
- 1Because it was thought to be the first computer so named with first alphabets of EnglishtrueCorrectWrong
- 2Because it was developed by Atanasoff and BerryfalseCorrectWrong
- 3Both of above are the reason to name the computer ABCfalseCorrectWrong
- 4None of the abovefalseCorrectWrong
Answer : 1. "Because it was thought to be the first computer so named with first alphabets of English"
Answer: A) Because it was thought to be the first computer so named with first alphabets of English Explanation:
Q:Which of the following is a true statement about Intranet and Internet ? 1415 05b5cc6c8e4d2b4197774df3c5b5cc6c8e4d2b4197774df3c
- 1Encryption is necessaryfalseCorrectWrong
- 2They use similar protocolfalseCorrectWrong
- 3Speed is slowfalseCorrectWrong
- 4They use the same protocoltrueCorrectWrong
Answer : 4. "They use the same protocol"
Answer: D) They use the same protocol Explanation:
Q:A method of providing virtual memory is called _____. 959 15b5cc6c5e4d2b4197774dd645b5cc6c5e4d2b4197774dd64
Answer : 2. "Segmentation"
Answer: B) Segmentation Explanation: