1. If your computer keeps rebooting itself, then it is likely that _______ ?

It has a virus

It does not have enough memory

There is no printer

There has been a power surge

Answer: There has been a power surge


If your computer keeps rebooting itself, then it is likely that there has been a power surge (option d). A power surge can cause the computer to shut down and restart unexpectedly. Other possible causes of the problem could include a hardware malfunction or software issues. However, based on the options provided, a power surge is the most likely cause of the issue.

2. A person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage is a ?



instant messenger


Answer: hacker


The person described in the question is a hacker. Therefore, the answer is (a) hacker.

3. You can protect sensitive data from prying eyes using ______ ?



File locks

File permissions

Answer: Encryption


Encryption is a technique in which sensitive data encrypted from misuse.

4. A hacker contacts your phone or E-mails and attempts to acquire your password is called ?





Answer: phishing


The correct answer is (b) phishing. Phishing is a type of social engineering attack where an attacker, often posing as a trustworthy entity, attempts to obtain sensitive information such as usernames, passwords, and credit card details by disguising themselves as a legitimate entity in an electronic communication.

5. Abuse messaging systems to send unsolicited is ?





Answer: spam


The correct answer is (b) spam. Spam refers to the use of messaging systems, such as email, text messaging, or social media, to send unsolicited messages, typically for advertising or promotional purposes. Spam can also be used for malicious purposes, such as phishing or spreading malware, but the act of sending unsolicited messages itself is considered spam.

6. A time bomb occurs during a particular ?

data or time

logic and data

only time

All of the above

Answer: data or time


Based on the given options, the most appropriate answer would be (a) data or time. A time bomb is a type of malware that is programmed to activate or cause harm after a specific amount of time has passed or at a certain date and time. Therefore, a time bomb occurrence is dependent on both data (the programmed time and date) and time (when that programmed time and date is reached). Option (b) logic and data, and option (c) only time do not fully capture the idea of a time bomb, as the former is too broad and could apply to many types of malware, while the latter is too narrow and does not account for the fact that the programmed time is also important in a time bomb attack. Option (d) All of the above is incorrect, as only option (a) is a correct statement regarding time bombs. Option (e) None of these is also incorrect, as option (a) is a correct statement regarding time bombs.

7. ‘Trend Micro’ is a ?

virus program

anti-virus software

just a program

All of these

Answer: anti-virus software


Anti-Virus software. Trend Micro is a well-known anti-virus software that helps protect computers and other devices from viruses, malware, and other security threats.

8. A program designed to destroy data on your compute which can travel to infect other computers, is called is ?





Answer: virus


The correct answer is (d) virus. A virus is a type of malicious program designed to replicate itself and spread to other computers by infecting and corrupting files and data. Some viruses are also designed to destroy data on the infected computer.

9. Which virus spreads in application software ?

Macro virus

Boot virus

File virus

Anti- virus

Answer: Macro virus


The correct answer is (a) Macro virus.

10. The first computer virus is ?



the famous


Answer: creeper


Creeper is considered to be the first computer virus. It was created in 1971 by Bob Thomas and ran on the TENEX operating system used by ARPANET, the predecessor to the modern internet. The virus would move through the network, displaying the message "I'm the creeper, catch me if you can!" on infected machines. The first antivirus program, called Reaper, was created to remove Creeper infections.