Choose the correct answer: 1x10=10
1. ________ is an example of Boot virus.
a. Worm b.Trojan Horse c. Stone virus d. All of the these
2. McAfee is an example of _____
a. Spam b. Anti-virus c. Worm d. Spyware
3. ________ is used for accepting input and giving output of a program.
a. Input/output box b. Flow lines c. Decision box d. Connector
4. Any algorithm can be developed using________ constructs.
a. One b. Two c. Three d. Four
5. A ________ constant contains a sequence of characters within double quotes.
a. Character b. String c. Numeric d. Both a & b
6. Who developed c?
a. Dennis Ritchie b. James Gosling c. Tim Berners lee d. Bill Gates
7. An ________is a combination of constants, variables, operators which computes
and produces the result.
a. Expression b. Constants c. Characters d. Statements
8. In flow chart _______ indicates the sequence of steps and direction of flow.
a. Start/stop box b. flow lines c. decision box d. processing box
9. The process of making duplicate copies of data which can be used to restore and
recover data is called_______.
a. Virus b. Back up c. Copy d. None of these
10. A software program which secretly monitors the user’s computing is called a
________.
a. Anti-virus b. Hacker c. Spyware d. Trojan Horse
Answers
Answered by
3
- c. Stone virus
- b. Antivirus
- a. output/input box
- c. Three
- b or d
- a. Dennis Ritchie
- a. Expression
- b. Flow lines
- b. Backup
- c. Spyware
Similar questions