1. Which is the set of rules for deter mining moral standards?
(a) Programs (b) Cracking (c) Ethics (d) Crimes
2. Which refers to the protection of hardware?
(a) Data security (b) Physical security (c) Personnel security (d) Personal security
3 Making and using duplicate hardware and software is called
(a) Crime (b) Publicity (c) Piracy (d) Security
4. A self-replication program that can cause damage to data and files stored on the computer is
(a) Antivirus (b) Virus (c) Language (d) Bacteria
5. How many new viruses are found each day?
(a) 57000 (b) 6 (c) 55000 (d) 5700
6. The software runs on an idle computer without the knowledge of the organization is called
(a) Software time (b) Computer time (c) System time (d) Hardware time
7. Which of the following laws prevent computer crimes in India?
(a) Crime (b) Illegal (c) Cyber (d) Zero
8. The illegal access to the network is called
(a) Cracking (b) Accessibility (c) Security (d) Management
9. The illegal access to the computer hardware and software
(a) Browsing (b) Hacking (c) Chatting (d) Cracking
10. ''Cracking'' comes
(a) Transcription (b) Website Service (c) Data Security (d) Computer Crime
11. Which refers to software setups that permit only authorized access to the system?
(a) Personal security (b) Personnel security (c) Physical security (d) Data security
12. Which security refers to protecting data and computer system against dishonesty?
(a) Personnel (b) Physical (c) Data (d) Personal
13. How many percent of computer crimes happen within the company?
(a) 80 (b) 90 (c) 60 (d) 70
14. How many known virus programs are in existence?
(a) 6 (b) 55000 (c) 5700 (d) 57000
15. Which of the following is not a way of protection?
(a) Physical Security (b) Personal Security (c) Piracy (d) Personnel Security
16. Which of the following is the telephone based Shared Centre?
(a) Website Services (b) Call center (c) Medical Transcription (d) e-Governance
17. Computer ethics has its roots in the work of
(a) Norbert Wiener (b) Herman Hollirith (c) Charles Babbage (d) Blaise Pascal
(a) Programs (b) Cracking (c) Ethics (d) Crimes
2. Which refers to the protection of hardware?
(a) Data security (b) Physical security (c) Personnel security (d) Personal security
3 Making and using duplicate hardware and software is called
(a) Crime (b) Publicity (c) Piracy (d) Security
4. A self-replication program that can cause damage to data and files stored on the computer is
(a) Antivirus (b) Virus (c) Language (d) Bacteria
5. How many new viruses are found each day?
(a) 57000 (b) 6 (c) 55000 (d) 5700
6. The software runs on an idle computer without the knowledge of the organization is called
(a) Software time (b) Computer time (c) System time (d) Hardware time
7. Which of the following laws prevent computer crimes in India?
(a) Crime (b) Illegal (c) Cyber (d) Zero
8. The illegal access to the network is called
(a) Cracking (b) Accessibility (c) Security (d) Management
9. The illegal access to the computer hardware and software
(a) Browsing (b) Hacking (c) Chatting (d) Cracking
10. ''Cracking'' comes
(a) Transcription (b) Website Service (c) Data Security (d) Computer Crime
11. Which refers to software setups that permit only authorized access to the system?
(a) Personal security (b) Personnel security (c) Physical security (d) Data security
12. Which security refers to protecting data and computer system against dishonesty?
(a) Personnel (b) Physical (c) Data (d) Personal
13. How many percent of computer crimes happen within the company?
(a) 80 (b) 90 (c) 60 (d) 70
14. How many known virus programs are in existence?
(a) 6 (b) 55000 (c) 5700 (d) 57000
15. Which of the following is not a way of protection?
(a) Physical Security (b) Personal Security (c) Piracy (d) Personnel Security
16. Which of the following is the telephone based Shared Centre?
(a) Website Services (b) Call center (c) Medical Transcription (d) e-Governance
17. Computer ethics has its roots in the work of
(a) Norbert Wiener (b) Herman Hollirith (c) Charles Babbage (d) Blaise Pascal
No comments:
Post a Comment