MCQS HOME 2020

The first electronic computer was developed by____________

(A) J.V. Attansoff

(B) Bill Gates

(C) Simur Cray

(D) Winton Serf

Submitted By: Ali Uppal


___________refers to electronic trespassing or criminal hacking

(A) Cracking

(B) Jacking

(C) Spoofing

(D) Smarming

Submitted By: Ali Uppal


__________is defined as any crime completed through the use of computer technology

(A) Computer forensics

(B) Computer crime

(C) Hacking

(D) Cracking

Submitted By: Ali Uppal


To prevent the loss of data during power failures, use a(n)_____________

(A) Encryption program

(B) Surge protector

(C) Firewall

(D) UPS

Submitted By: Ali Uppal


The scrambling of code is known as___________

(A) Encryption

(B) a firewall

(C) Scrambling

(D) Password proofing

Submitted By: Ali Uppal


Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)___________

(A) Hacker-proof program

(B) Firewall

(C) Hacker-resistant server

(D) Encryption safe wall

Submitted By: Ali Uppal


What is the most common tool used to restrict access to a computer system

(A) User logins

(B) Passwords

(C) Computer keys

(D) Access-control software

Submitted By: Ali Uppal


____________is the measurement of things such as fingerprints and retinal scans used for security access

(A) Biometrics

(B) Bio measurement

(C) Computer security

(D) Smart weapon machinery

Submitted By: Ali Uppal


Submitted By: Ali Uppal


When a logic bomb is activated by a time_related event, it is known as a____________

(A) Time-related bomb sequence.

(B) Virus.

(C) Time bomb.

(D) Trojan hors

Submitted By: Ali Uppal