GK in Computer| Computer questions and answers| 50 questions. including WBPSC, PSC, SSC, RRB NTPC, UPSC, NDA, WBP, constable, postal, etc Exams.
The computer Gk question is a very important question because it is the time to prepare for the competitive exam. Students are often confused to solve computer GK questions in Bengali competitive exams. So, here I am sharing selected computer Gk questions including WBCS, PSC, SSC, RRB NTPC, UPSC, NDA, WBP, constable, postal, etc exam. and bank exam answers.
আপনি যদি একটি প্রতিযোগিতামূলক পরীক্ষার জন্য প্রস্তুতি নিচ্ছেন, তাহলে আপনার কর্মক্ষমতা উন্নত করতে আপনার কম্পিউটারের Gk প্রশ্ন গুলি পড়তে হবে। এই প্রশ্নগুলি আপনাকে প্রতিযোগিতামূলক পরীক্ষায় কম্পিউটার GK প্রশ্ন গুলি সমাধান করতে এবং পরীক্ষায় উচ্চ স্কোর করতে সাহায্য করবে।
GK in Computer| Computer questions and answers| 50 questions.
1. The first computer virus is --------?
Ans. Creeper.
2. To protect a computer from viruses, you should install -------- in your computer?
Ans. antivirus.
3. Which of the following is known as Malicious software?
Ans. malware
.
4. McAfee is an example of?
Ans. Antivirus.
5. A ------- is a computer program that can invade a computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files)
Ans. Computer Virus.
6. When a logic bomb is activated by a time-related event, it is known as -------
Ans. time bomb.
7. -------- are often delivered to a PC through an email attachment and are often designed to do harm
Ans. Virus.
8. The altering of data so that it is not usable unless the changes are undone is
Ans. encryption.
9. VIRUS stands for
Ans. Vital Information Resource Under Siege.
10. What is short for malicious software (software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?
Ans. Malware.
11. Which of the following is not an antivirus software?
Ans. Code Red.
12. Which of the following is/are threats to electronic payment systems?
Ans. All of the above.
13. A virus that migrates freely within a large population of unauthorized email users is called a -------
Ans. macro.
14. -------- are attempts by individuals to obtain confidential information from you to falsifying their identity
Ans. Phishing scams.
15. Authentication is
Ans. hard to assure the identity of the user on a remote system.
16. A -------- is a computer program that can replicate itself and spread from one computer to another
Ans. Computer Virus.
17. Which of the following virus overtake computer system, when it boots and destroys information?
Ans. Stealth virus.
18. Key logger is a
Ans. Spyware.
19. To protect yourself from computer hackers, you should turn on a
Ans. Firewall.
20. Firewalls are used to protect against
Ans. unauthorized access.
21. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?
Ans. Worm.
22. -------- Software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.
Ans. Antivirus.
23. Code red is a(n) ----------
Ans. Virus.
24. Which of the following would most likely not be a symptom of a virus?
Ans. The CD–ROM stops functioning.
25.. …………….. are used in denial-of-service attacks, typically against targeted websites
Ans. Zombie.
26. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase
Ans. ii, i, iv and iii.
27. A ……………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect
Ans. Parasitic Virus.
28.. ………….. is a form of virus explicitly designed to hide itself from detection by antivirus software
Ans. Stealth virus.
29. A ……………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns
Ans. Polymorphic Virus.
30. A portion of the Polymorphic virus, generally called a ……………….., creates, a random encryption, key to encrypt the remainder of the virus
Ans. mutation engine.
31. State whether the following statement is true. i) A macro virus is platform-independent. ii) Macro viruses infect documents, not executable portions of code
Ans. Both i and ii.
32. The type(s) of auto executing macros, in Microsoft word is/are
Ans. All of the above.
33. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk
Ans. Propagation phase.
34. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks
Ans. Zombie.
35. What is the name of the Act that governs internet usage in India?
Ans. The Information Technology Act, 2004.
36. All of the following are examples of real security and privacy risks EXCEPT
Ans. Spam.
37. A worm is...
Ans. Pieces of malicious code that make copies of themselves and spread through computers without human interaction.
38. You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?
Ans. No.
39. Why might someone break into (hack) your computer?
Ans. All of the above.
40. If you receive an email claiming to need your username and/or password, what should you do?
Ans. Report it as phishing/spam through your email provider .
41. Both email attachments and downloaded files can spread malware
Ans. TRUE.
42. What is the best way to protect your information when you are away from your computer?
Ans. Lock the computer with a password.
43. What is a firewall?
Ans. A filter for an internet connection that monitors outgoing and incoming activity.
44. A strong password should contain
Ans. At least 8 characters, and a combination of letters, numbers, and characters.
45. Social engineering is
Ans. Scams distributed through email such as phishing, pharming and impersonation.
46. What is “Trend Micro”?
Ans. It is anti-virus software.
47. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?
Ans. Trojan horses.
48. The virus that spread in application software is called as
Ans. Macro virus.
49. How does a Le-Hard virus come into existence?
Ans. Command.Com.
50. What is the virus that spreads in computers?
Ans. It is a computer program.
If you have any doubts or questions, please let me know.... যদি আপনার কোনও সন্দেহ বা প্রশ্ন থাকে তবে দয়া করে আমাকে জানান.....