1.
The
term computer security refers to:
Use of antivirus Protection of software Protection to a computer system Use of firewall
2.
An
important counter measure against data corruption or loss.
Password policy Defragmentation Scan disk Backup
system
3.
Which
is not the power protection device?
UPS Spike
Guard Volt Guard Scan
disk
4.
_______
protects the machine and peripheral devices from being damage.
Information security Hardware security Software security None
of them
5.
To
prevent the loss of data during power failures, we use:
Encryption program Surge protector Firewall UPS
6.
_____
are used to avoid access for unauthorized users.
Logins Passwords Encryption Lock
and key
7.
Scan
disk is used for
Removing virus Removing bad clusters Backup data All of above
8.
_____________ protect the
machine and peripheral hardware from theft, electronic intrusion and damage.
i)
Information security ii)
Hardware security iii)
Software
security iv)
None of the above
9.
Some of the methods of hardware protection are:
i)
Fire Alarms
ii) Security Lighting iii)Closed-circuit
cameras
iv)All
of above
10.
c) The temperature in computer system should be maintained
between ______to________
i)21`C
to
24`C
ii) 20`C to 25`C iii)
23`C to 28`C iv)
None of the above
11.
d) A device that protects your PC against power surges and
spikes.
i)
UPS
ii) Voltage Regulator iii)
Surge
suppressor
iv) All of the above
12.
e) The type of security that provides barriers and other cyber
–tools that protect programs, files
and
the information flow to and from a computer.
i)
Computer
security ii)
Hardware security iii)
Software
security
iv) None of the above
13. protects the
machine and peripheral hardware from theft electronic intrusion and damage.
i.
Information security
ii. Hardware security iii.
Software security iv. None of the above
14. Some
of the methods of hardware protection are:
i.
Password security ii. Security
lighting iii. Scandisk
iv. All of the above
15. The
temperature in the computer system should be maintained between and .
i.68
to 72 degree Fahrenheit ii.88
to 78 degree Fahrenheit iii.68
to 27 degree Fahrenheit iv. All
16. is a device that
allows your computer to keep running for at least a short time when the primary
power source is lost.
i.UPS ii. Voltage regulator iii. Surge processor
iv. All of the above
17. An
electrical regulator designed to automatically maintain a constant voltage
level.
i.UPS ii. Voltage regulator iii. Surge processor iv. All of the above
18. refers to the
condition of a disk in which files are divided into pieces scattered around the
disk.
i.
Fragmentation ii. Defragmentation iii. Scan disk iv. All of the above
19. An
important countermeasure against data corruption or loss.
i.Password
policy ii. Defragmentation iii. Scan disk iv. Backup system
20. Protects
the machine and peripheral hardware from theft, electronic intrusion and
damage.
i)Information security ii)Hardware security iii)Software security
21. The
temperature in the computer system should be maintained between to .
i)21oC and 24oC ii)22oC and 25oC iii)23oC and 26oC
22. A
device that protects your PC against power surges and spikes.
i)UPS ii) Voltage regulator iii)Surge suppressor
23. The
type of security barriers and other cyber-tools that protect programs files,
and the information flow to and from a
computer.
i)Computer security ii)Hardware security iii)Software security
24. The
process of loading the noncontiguous fragments of data, rearranging the fragments and restoring them into fewer fragments or into the whole
life.
i)Fragmentation ii)Defragmentation iii)Scan disk
25. Which
of the following is not hardware security method?
i. Insurance ii. Maintenance iii. Closed-circuit cameras iv. Hard lock key
26. Which
of the following measure allows to protect compouters being opened from
unauthorized user?
i .Antivirus
program ii. Password iii. Debug iv. program
27. The
computer security is purely concerned with the following
i. Hardware
security ii. software
security iii. Hardware and software
security iv. Data security
28. Which
of the following is not power supply device?
i. Volt guard ii.UPS iii. Constant Voltage Transformer iv. Power Plug
29. Which
of the following is not software security measure?
i. Virus Scanning ii. Scandisk iii. Password iv. Security Guard
30.
Common computer security is
Hardware
Security Software security Hardware & software security None of them
31.
Hardware security includes
Regular
maintenance Use of power of regulator devices Both None of them
32.
Data and software security includes
Protection
from computer virus Cover the
computer property Both None of them
33.
UPS is a
Voltage
filtration device Voltage processing device Voltage regulator
device None
34.
Scan disk is performed by using
Application
software Operating system software Utility
software None
35.
Backup is way of
i.
Securing data and information Securing internal part of the
computer
ii.
Securing external parts of the computer None
of them
36.
Defragmentation is a process of
Formatting
the disk Relocation of the disk Relocation of the
files of the disk None of them
37.
…….protects the machine and peripheral
hardware from theft, electronic intrusion and damage.
i.
information security ii.
Hardware security iii.
Software security
38.
The temperature in the computer system
should be maintained between …. to ….
i.21
to 24 ii.22 to
25 ii.23 to
26
39.
A device that protects your PC against
power surges and spikes.
i.
Uninterruptible Power Supply ii. Voltage regulator iii. Surge suppressor
40.
The type of security that provides
barriers and other cyber tools that protects program, files, and the
information flow to and from a computer
i.
computer security ii. Hardware
security iii. Software
security
41.
The ………. Process optimize the read/write
process by realigning the speed posiyion of related file clusters to speed up
the overall operation of the drive
i. Fragmentation ii. Defragmentation iii. Scan disk
42. Which
device protects hardware?
i) UPS ii) MODEM iii) Gateway iv) All of the above
i) UPS ii) MODEM iii) Gateway iv) All of the above
43. Process of arranging the scattered parts of file into a contiguous
manner is _______.
i.
debugging ii.
Backup iii. Defragmentation iv.
Scandisk
44.
Process of arranging the scattered parts
of file into a contiguous manner.
i) Backup ii) Defragmentation iii) Debugging iv) All of the above
i) Backup ii) Defragmentation iii) Debugging iv) All of the above
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Mcq - Computer Security - See 2074 [Computer Science] >>>>> Download Now
ReplyDelete>>>>> Download Full
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Mcq - Computer Security - See 2074 [Computer Science] >>>>> Download LINK
>>>>> Download Now
Qbasic Programming Solutions And Slc / See Computer Science Questions Solved : Mcq - Computer Security - See 2074 [Computer Science] >>>>> Download Full
>>>>> Download LINK vh