Computer Science Basic MCQs


Q.  is the process of dividing the disk into tracks and sectors.

a. Tracking
b. Formatting
c. Crashing
d. Allotting


ANSWER: See Answer
 
No explanation is available for this question!
MCQs:  Malicious software is known as:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  A program that performs a useful task while simultaneously allowing destructive acts is a:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  In 1999, the Melissa virus was a widely publicised:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  What type of virus uses computer hosts to reproduce itself?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  The thing that eventually terminates a worm virus is a lack of:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  When a logic bomb is activated by a time-related event, it is known as a:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  What is the name of an application program that gathers user information and sends it to someone through the Internet?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  is the measurement of things such as fingerprints and retinal scans used for security access.
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  What is the most common tool used to restrict access to a computer system?
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  The scrambling of code is known as:
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  To prevent the loss of data during power failures, use a(n):
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  Is defined as any crime completed through the use of computer technology.
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  refers to electronic trespassing or criminal hacking.
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  The first electronic computer was developed by
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  Snowbol is an/a---------
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  Switching device of fifth generation computer is________________
Category: Computer Science MCQs,   Published by: teswesm
MCQs:  computers operates essentially by counting
Category: Computer Science MCQs,   Published by: teswesm