Self Studies

Societal Impacts of IT Test 1

Result Self Studies

Societal Impacts of IT Test 1
  • Score

    -

    out of -
  • Rank

    -

    out of -
TIME Taken - -
Self Studies

SHARING IS CARING

If our Website helped you a little, then kindly spread our voice using Social Networks. Spread our word to your readers, friends, teachers, students & all those close ones who deserve to know what you know now.

Self Studies Self Studies
Weekly Quiz Competition
  • Question 1
    1 / -0

    Which one of the following is not a malware? 

    Solution

    Application software refers to the condition in which your computer stops working.

  • Question 2
    1 / -0

    The electronic equivalent of junk mail is known as

    Solution

    Spam is an electronic equivalent of junk mail.


  • Question 3
    1 / -0

    A good way to safeguard access to your computer is to protect it.

    Solution

     Password is a good way to safeguard access to your computer to protect it.

  • Question 4
    1 / -0

    …………… stands for Malicious Software, is software designed to infiltrate a computer system without the owner’s informed consent.

    Solution

    Malware designed to interrupt ongoing computer operations, collect private information and gain unauthorised access to your system resources.

  • Question 5
    1 / -0

    Which of the following statements is incorrect in the context of a worm?

    Solution

    Worm is self replicating software and thus, it can travel on its own.

  • Question 6
    1 / -0

    Which one of the following is not a way to get a computer virus?

    Solution

    By typing on keyboard is not a way to get a computer virus.

  • Question 7
    1 / -0

    Which of the following is not a symptom of a virus attack?

    Solution

    Your data is copied to another location is not a symptom of a virus attack.

  • Question 8
    1 / -0

    Which of the following is not an example of worm?

    Solution

    De bumper is a type of trojan horse.

  • Question 9
    1 / -0

    A …….. is a virus that is often disguised as a useful computer program.

    Solution

    Trojan horse is a virus, i.e. often disguised as a useful computer program.

  • Question 10
    1 / -0

    A category of software that spies of your computer activities is

    Solution

    Spyware is a category of software that spies computer activities.

  • Question 11
    1 / -0

    Which of the following is not antivirus software?

    Solution

     Melissa is a macro virus, not an antivirus.

  • Question 12
    1 / -0

    Which of the following is the first computer virus?

    Solution

    Elk Cloner is the first computer virus created by Richard Skrenta.

  • Question 13
    1 / -0

    The at first glance will appear to be useful software but will actually do damage once installed or run on your computer.

    Solution

    The trojans are unauthorised programs placed inside a legitimate application.

  • Question 14
    1 / -0

     A ……. is a software program that is designed to copy itself from one computer to another, without human intervention.

    Solution

    A worm is a self-replicating software program. It does not require another program to host it.

  • Question 15
    1 / -0

    Out of the following, which one will be altered or modified by a computer virus?

    Solution

    Answer: (d) All of the above

Self Studies
User
Question Analysis
  • Correct -

  • Wrong -

  • Skipped -

My Perfomance
  • Score

    -

    out of -
  • Rank

    -

    out of -
Re-Attempt Weekly Quiz Competition
Self Studies Get latest Exam Updates
& Study Material Alerts!
No, Thanks
Self Studies
Click on Allow to receive notifications
Allow Notification
Self Studies
Self Studies Self Studies
To enable notifications follow this 2 steps:
  • First Click on Secure Icon Self Studies
  • Second click on the toggle icon
Allow Notification
Get latest Exam Updates & FREE Study Material Alerts!
Self Studies ×
Open Now