FeedBack Form

Your Name :
Your Email :
Your Location :
Your Message :
   
FeedBack

Computer Security MCQ Questions and Answers

21. -------- are often delivered to a PC through an email attachment and are often designed to do harm.
 
  • A. Spam
  • B. Email
  • C. Portals
  • D. Virus
 
22. The altering of data so that it is not usable unless the changes are undone is
 
  • A. ergonomics
  • B. compression
  • C. biometrics
  • D. encryption
 
 
23. When a logic bomb is activated by a time related event, it is known as -------
 
  • A. virus
  • B. trojan horse
  • C. time related bomb sequence
  • D. time bomb
 
24. A ------- is a computer program that can invade computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files or destroying your hard disk).
 
  • A. Ms Word
  • B. Ms Access
  • C. Antivirus
  • D. Computer Virus