Computer Awareness Quiz for Upcoming Exams (Part 39)

computer awareness quiz
1. Which of the following can't spread Virus ?
     (a) An e-mail with attachment
     (b) A plain text mail

     (c) Downloading files over the web
     (d) A per drive use
     (e) None of these

2. Which of the following is not a virus ?
     (a) Blaster
     (b) Creeper
     (c) Mellisa
     (d) Kaspersky
     (e) none of these

3. Unwanted repetitious messages, such as unsolicited bulk e-mails is known as.
    (a) Spam
    (b) Trash
    (c) Calibri
    (d) Courier
    (e) None of these

4. Le-Hard virus is effect of a ________________.
    (b) Hardware
    (c) Software
    (d) Application
    (e) None of these

5. Which of the following is not a popular Anti-Virus software ?
     (a) Kaspersky
     (b) Symantec
     (c) Trend Micro
     (d) Blaster
     (e) None of these

6. A result of a computer Virus can not lead to.
    (a) Disk Crash
    (b) Mother Board crash
    (c) Corruption
    (d) Deletion of files
    (e) None of these

7. All of the following are example of real security and privacy risks except.
   (a) Hackers
   (b) Spam
   (c) Viruses
   (d) Identify theft
   (e) None of these

8. Which of the following is a popular Dos based spread Sheet ?
    (a) Excel
    (b) Word
    (c) Smart cell
    (d) Lotus 1-2-3
    (e) None of these

9. Eithernet, LAN, Token Ring, and token Bus are types of _______________.
   (a) WAN
   (b) Communication channels
   (c) LAN
   (d) Physical Medium
   (e) None of these

10. An e-mail account includes a storage area, often called a ____________________.
      (a) Attachment
      (b) Hyperlink
      (c) Mailbox
      (d) IP address
      (e) None of these

11. What is the name of the software that allows us to browse through web pages called ?
      (a) Browser
      (b) Mail client
      (c) FTP client
      (d) Messenger
      (e) None of these

12. Most world wide web pages contain commands in the language ______________.
      (a) NIH
      (b) URL
      (c) HTML
      (d) IRC
      (e) None of these

13. Fire walls are used to protect against
      (a) Un authorised Attacks
      (b) Virus Attacks
      (c) Data Driver Attacks
      (d) Fire Attacks
      (e) None of these

14. "Trend Micro" is a ______________?
       (a) Virus program
       (b) Anti virus program
       (c) Application
       (d) All of the above
       (e) None of these

15. The most important powerful computer in a typical network is ______________.
      (a) Desktop
      (b) Network Client
      (c) Network Server
      (d) Network Station
      (e) None of these


1. A plain text mail
2. Kaspersky
3. Spam
5. Blaster
6. Mother Board crash
7. Spam
8. Lotus 1-2-3
9. LAN
10. Mailbox
11. Browser
12. HTML
13. Virus Attacks
14. Anti virus program
15. Network Server

==>> Download Computer Awareness PDF (Free)
Join 40,000+ readers and get free notes in your email


Post a Comment

Thanks for commenting. It's very difficult to answer every query here, it's better to post your query on