Home | Solved Mcqs | Sixth Chapter Solved Exercise MCQs Of ICS First Year Computer Science

Sixth Chapter Solved Exercise MCQs Of ICS First Year Computer Science

September 16, 2024

Sixth Chapter Solved Exercise MCQs of ICS First Year Computer Science offers a collection of multiple-choice questions with answers, tailored for ICS students. This resource helps students review key concepts, practice for exams, and improve their understanding of the second chapter in Computer Science.

Sixth chapter solved MCQs with explanation

1. A virus program is usually hidden in

(a) The operating system only

(b) An application program only

(c) The disk drive

(d) The operating system or application programs

Explanation: Viruses can be hidden in both operating systems and application programs, making it difficult to detect and remove.

2. Most computer crimes are committed by

(a) Hackers

(b) International spies

(c) Highly trained computer consultants

(d) Company insiders who have no extraordinary technical ingenuity

Explanation: Many computer crimes are committed by individuals who have access to sensitive information within their organizations.

3. Types of software that can be freely distributed without violating copyright laws are called

(a) Shareware

(b) Public domain

(c) Copy protected

(d) a and b

Explanation: Shareware and public domain software can be freely distributed without violating copyright laws.

4. Information is

(a) A marketable commodity

(b) Can be stolen while leaving the original behind

(c) Should be free, according to the original hacker ethic

(d) All of above

Explanation: Information can be a marketable commodity, can be stolen without affecting the original, and has been debated as to whether it should be free.

5. A virus that replicates itself is called a

(a) Bug

(b) Worm

(c) Vaccine

(d) Bomb

Explanation: A worm is a self-replicating virus that spreads through networks without requiring human intervention.

6. Another name for free software

(a) Encrypted software

(b) Copy protected software

(c) Public domain software

(d) Shareware

Explanation: Public domain software is another name for free software that is not protected by copyright laws.

7. Another name for antivirus is

(a) Vaccine

(b) Worm

(c) Trojan horse

(d) DES

Explanation: A vaccine is a type of antivirus software that protects against computer viruses.

8. Security protection for personal computers include

(a) Internal components

(b) Locks and cables

(c) Software

(d) All of these

Explanation: Security protection for personal computers includes internal components, physical security measures, and software-based protections.

9. A secret word or numbers to be typed in on a keyboard before any activity can take place are called

(a) Biometric data

(b) Data encryption

(c) Password

(d) Private word

Explanation:  A password is a secret word or number used to access a computer system or account.

10. What is the most common computer crime of these listed below

(a) Extortion of bank funds

(b) IRS database sabotage

(c) Putting people on junk mailing lists

(d) Software piracy

Explanation: A junk mail folder, also known as a spam folder, is a designated location within your email client where unwanted or unsolicited messages are automatically filtered. This helps keep your inbox clutter-free and allows you to focus on more important emails.