GK

the first computer virus is

  • Black Hat
  • Melissa
  • Param
  • Creeper

Which of the following is an antivirus software? RRB NTPC 5/1/2021 (Evening)

  • Google
  • XML
  • Norton
  • Microsoft

Which of the following is NOT an anti-virus software? SSC CHSL 9/07/2019 (Evening)

  • Avast
  • Linux
  • Norton
  • Kaspersky

———–changes each time it is installed to avoid detection by antivirus software. SSC CGL 29/08/2016 (Morning)

  • Polymorphic virus
  • worm
  • logic bomb
  • trojan horse

Which one is anti-virus? RRB NTPC CBT 1 6/04/2016 (Afternoon)

  • CodeRed
  • Dr. Web
  • CryptoLocker
  • Melissa

————can easily be spread to the computers connected to the internet. Such attacks may cause your system to crash, or your important data may get deleted. SSC Delhi Police 13/10/2022 (Morning)

  • Virus
  • Chat
  • Search
  • Email

A ———-is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. SSC Delhi Police 18/10/2022 (Afternoon)

  • Blog
  • Instant messenger
  • virus
  • Email

Which one of the following is a computer virus? SSC CHSL 9/8/2021 (Morning)

  • Penguin
  • Spider
  • Panda
  • Creeper

The Creeper virus is the first computer virus ever developed by whom ?

  • Bob
  • berners lee
  • grahm ross
  • Camila Sokis

The Creeper virus is the first computer virus ever developed in which Year ?

  • 1972
  • 1981
  • 1970
  • 1971

A programme or piece of code that is loaded onto a person’s computer without his/her knowledge and runs against his/her wishes is a type of malware called: RRB NTPC 07/03/2021 (Morning)

  • Virus
  • Trojan Horse
  • Zeus
  • Spyware

Which of the following Compute viruses damages the formatting of a document and does NOT allow it to edit? RRB NTPC 03/03/2021 (Evening)

  • File virus
  • Macro virus
  • Worm
  • Boot sector virus

Which mechanism is used by the computer virus ‘worm’ to duplicate itself? SSC CGL 31/08/2016 (Evening)

  • Swap
  • Spawn
  • Increment
  • Swarm

Who is a hacker? RRB NTPC CBT 1 28/04/2016 (Morning)

  • A person who sells goods in the street.
  • A person who uses computers to gain unauthorized access to data
  • A person who only sells computers online.
  • A person who records phone cells.

Which of the following uses the spawn mechanism to duplicate itself? SSC CGL 1/09/2016 (Evening)

  • Trojan horse
  • Worm
  • Keystroke logger
  • Logic bomb
computer-Computer Security