1st Year Computer Science Chapter 6 Security, Copyright and the Law Notes MCQs

computer 11th notes Chapter 6

1. Which of the following is computer virus?

 
 
 
 

2. What is the most common computer crime of these listed below?

 
 
 
 

3. Which of the following one is not a virus?

 
 
 
 

4. Which of the following is the most damaging loss to a company?

 
 
 
 

5. Another name for antivirus is

 
 
 
 

6. A secret word or number to be typed by a keyboard before an activity can take place are called

 
 
 
 

7. Computer virus is simply a:

 
 
 
 

8. The right of a person to keep his personal information away from others is called: 

 
 
 
 

9. The secrets word or number used for protection is called:

 
 
 
 

10. A virus program is usually hidden in:

 
 
 
 

11. Software that is used to detect and remove the viruses from the computer is called

 
 
 
 

12. Which of the following is not a biometric technique:

 
 
 
 

13. A set of illegal instructions inserted into a legitimate computer program is called:

 
 
 
 

14. The virus which deletes MS Office files and disk partition information is called:

 
 
 
 

15. ____ is an anti-virus program

 
 
 
 

16. Another name for free software is:

 
 
 
 

17. A virus that replicates itself is called:

 
 
 
 

18. ____viruses infects the first sector of disk

 
 
 
 

19. ____is not an anti-virus program

 
 
 
 

20. A program that interferes with the normal working of a computer is called:

 
 
 
 

21. ____ is cause of virus

 
 
 
 

22. Which of the following media can be used for backup?

 
 
 
 

23. Types of software that can be freely distributed without violating copyright laws are called

 
 
 
 

24. Viruses are transferred from one computer to another due to

 
 
 
 

25. Word Which is not an antivirus program?

 
 
 
 

26. The right to use the software on the computer is called:

 
 
 
 

27. Which malicious program is activated when a specific set of conditions are met?

 
 
 
 

28. Trojan Horse is a type of

 
 
 
 

29. Most common crimes are committed by

 
 
 
 

30. Software that is available free for a limited period is called:

 
 
 
 

31. A special program that can detect and remove viruses from computer is called:

 
 
 
 

32. The extension of an executable file is: 

 
 
 
 

33. ____virus is activated on the basis of a logical condition

 
 
 
 

34. Protecting computers and the information they contain against unwanted access, damage, modification or destruction is called:

 
 
 
 

35. Security protection for personal computers includes:

 
 
 
 

36. ____media is used for backup

 
 
 
 

37. Which Virus is activated on the basis of a logical condition?

 
 
 
 

38. A virus is just a

 
 
 
 

39. McAfee is an example of:

 
 
 
 

40. Format C is an example of

 
 
 
 

41. Which of the following is not an antivirus program?

 
 
 
 

42. An additional or spare copy of data stored on storage media is call:

 
 
 
 

43. Who is responsible of security of online data?

 
 
 
 

44. A virus can destroy

 
 
 
 

Short Questions

1. Define pirated software?
2. Describe FOUR approaches for authentication of authorized user.
3. Explain 1980 Privacy Protection Act.
4. Explain 1984 Cable Communication Policy Act.
5. Explain 1987 Computer Security Act.
6. Explain 1998 Data Protection Act.
7. Explain any FOUR Privacy Acts.
8. Explain any TWO of FOUR Causes of Virus.
9. Explain Boot Sector Virus.
10. Explain Chernobyl Virus.
11. Explain Computer Misuse Act of 1990
12. Explain Data Protection.
13. Explain Data Security.
14. Explain Logic Bomb Virus.
15. Explain main threats to Data Security.
16. Explain Security Violation giving TWO of FIVE examples.
17. Explain Trojan Horse.
18. Explain Video Privacy Protection Act of 1988.
19. Explain Virus.
20. How Redlof Virus causes damage ?
21. How to safeguard against viruses
22. How virus is activated?
23. List different types of viruses?
24. What are FOUR Privacy issues ?
25. What are Security Threats to data and Explain Privacy Issues
26. What are the causes of virus?
27. What are the principles of Data Protection Acts ?
28. What do you know about copyright act?
29. What is boot sector virus?
30. What is Copyright Act ? How does it help to stop software piracy ?
31. What is data security?
32. What is logic bomb?
33. What is meant by Antivirus?
34. What is Redlof?
35. What is the purpose of password?
36. What is Trojan horse?
37. What should we consider to ensure Individual’s Privacy ?

Long Questions

1. What is computer virus?
2. Define the anti-virus software.
3. How viruses may damage computer system?
4. Define Data protection Piracy acts.
5. Describe the Legislation and Copyright Issues.
6. Define the types of viruses.
7. What is a password?
8. Write the names and define briefly the antivirus.
9. Describe the exemption of 1990 act.

Leave a Reply

Your email address will not be published. Required fields are marked *