Computer Science 1st Year Chapter 6 Security, Copyright and the Law Questions Bank

Computer Science 1st Year Chapter 6 Security, Copyright and the Law Questions Bank
Computer Science 1st Year Chapter 6 Security, Copyright and the Law Questions Bank

Computer Science 11th Chapter 6 Security, Copyright and the Law Questions Bank

MCQs

Please select the right answer.

1. ____ is an anti-virus program





2. ____ is cause of virus






3. ____is not an anti-virus program






4. ____media is used for backup






5. ____virus is activated on the basis of a logical condition






6. ____viruses infects the first sector of disk





7. A program that interferes with the normal working of a computer is called:






8. A secret word or number to be typed by a keyboard before an activity can take place are called





9. A set of illegal instructions inserted into a legitimate computer program is called:





10. A special program that can detect and remove viruses from computer is called:






11. A virus can destroy





12. A virus is just a





13. A virus program is usually hidden in:






14. A virus that replicates itself is called:





15. An additional or spare copy of data stored on storage media is call:






16. Another name for antivirus is





17. Another name for free software is:





18. Computer virus is simply a:





19. Format C is an example of





20. McAfee is an example of:





21. Most common crimes are committed by





22. Protecting computers and the information they contain against unwanted access, damage, modification or destruction is called:





23. Security protection for personal computers includes:






24. Software that is available free for a limited period is called:





25. Software that is used to detect and remove the viruses from the computer is called





26. The extension of an executable file is: 





27. The right of a person to keep his personal information away from others is called: 






28. The right to use the software on the computer is called:






29. The secrets word or number used for protection is called:






30. The virus which deletes MS Office files and disk partition information is called:





31. Trojan Horse is a type of





32. Types of software that can be freely distributed without violating copyright laws are called






33. Viruses are transferred from one computer to another due to





34. What is the most common computer crime of these listed below?






35. Which malicious program is activated when a specific set of conditions are met?






36. Which of the following is computer virus?






37. Which of the following is not a biometric technique:





38. Which of the following is not an antivirus program?





39. Which of the following is the most damaging loss to a company?





40. Which of the following media can be used for backup?






41. Which of the following one is not a virus?





42. Which Virus is activated on the basis of a logical condition?





43. Who is responsible of security of online data?





44. Word Which is not an antivirus program?





 

Short Questions

1. Define pirated software?
2. Describe FOUR approaches for authentication of authorized user.
3. Explain 1980 Privacy Protection Act.
4. Explain 1984 Cable Communication Policy Act.
5. Explain 1987 Computer Security Act.
6. Explain 1998 Data Protection Act.
7. Explain any FOUR Privacy Acts.
8. Explain any TWO of FOUR Causes of Virus.
9. Explain Boot Sector Virus.
10. Explain Chernobyl Virus.
11. Explain Computer Misuse Act of 1990
12. Explain Data Protection.
13. Explain Data Security.
14. Explain Logic Bomb Virus.
15. Explain main threats to Data Security.
16. Explain Security Violation giving TWO of FIVE examples.
17. Explain Trojan Horse.
18. Explain Video Privacy Protection Act of 1988.
19. Explain Virus.
20. How Redlof Virus causes damage ?
21. How to safeguard against viruses
22. How virus is activated?
23. List different types of viruses?
24. What are FOUR Privacy issues ?
25. What are Security Threats to data and Explain Privacy Issues
26. What are the causes of virus?
27. What are the principles of Data Protection Acts ?
28. What do you know about copyright act?
29. What is boot sector virus?
30. What is Copyright Act ? How does it help to stop software piracy ?
31. What is data security?
32. What is logic bomb?
33. What is meant by Antivirus?
34. What is Redlof?
35. What is the purpose of password?
36. What is Trojan horse?
37. What should we consider to ensure Individual's Privacy ?

Long Questions

1. What is computer virus?
2. Define the anti-virus software.
3. How viruses may damage computer system?
4. Define Data protection Piracy acts.
5. Describe the Legislation and Copyright Issues.
6. Define the types of viruses.
7. What is a password?
8. Write the names and define briefly the antivirus.
9. Describe the exemption of 1990 act.

Post a Comment (0)
Previous Post Next Post