Class  7

Class 7

7th Grade

15 Qs

quiz-placeholder

Similar activities

Geografi Tingkatan 1 Bab 10

Geografi Tingkatan 1 Bab 10

7th Grade

19 Qs

Reakcje Redoks - II TMR i TM

Reakcje Redoks - II TMR i TM

7th Grade

10 Qs

PENGENALAN KEPADA REKA BENTUK DAN TEKNOLOGI

PENGENALAN KEPADA REKA BENTUK DAN TEKNOLOGI

7th Grade

20 Qs

Geografi Tingkatan 1 Bab 12- Sumber Air

Geografi Tingkatan 1 Bab 12- Sumber Air

7th Grade

20 Qs

新诗:《乡愁》 余光中

新诗:《乡愁》 余光中

6th - 11th Grade

10 Qs

DB 4A atividade 2

DB 4A atividade 2

7th - 10th Grade

10 Qs

Wartościowość

Wartościowość

7th - 9th Grade

11 Qs

Geografi Tingkatan 1 Bab 13

Geografi Tingkatan 1 Bab 13

7th Grade

19 Qs

Class  7

Class 7

Assessment

Quiz

7th Grade

Medium

Created by

Aryan Moholkar

Used 272+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

a. A computer virus may be capable of

i. Infecting executable files

ii. Infecting disks by attaching itself to special programs on the hard disk, called

boot records

iii. Both i and ii

iv. None of the above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

b. Which of the following are the signs of a virus attack?

i. The computer runs slower than normal

ii. There is a change in file size

iii. The computer restarts on its own

iv. All of the above

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

c. A computer virus can spread through

i. E-mails

ii. Pen Drives

iii. Both i and ii

iv. None of these

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

d. Program viruses infect files that have the extension

i. COM

ii. .EXE

iii. .SYS

iv. All of these

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

e. Which of the following is a boot virus?

i.Michelangelo

ii. Sunday

iii. Acid Rain

iv. None of these

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

f. Which of the following are infected by a macro virus?

i. .exe files

ii. Boot records

iii. DATA files

iv. None of these

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

g. _________ refers to computer programs that secretly gather information about the user and relay it to other interested parties.

i. Worm

ii. Spyware

iii. Virus

iv. None of these

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?