BCM SCHOOL, BASANT AVENUE, DUGRI ROAD, LUDHIANA
Typography & Computer Application -XII
1. A computer ________ is a malicious code which self-replicates by copying itself
to other programs.
a. Program
b. Virus
c. Application
d. worm
2. Which of them is not an ideal way of spreading the virus?
a. Infected website
b. Emails
c. Official Antivirus CDs
d. USBs
3. Which of the below-mentioned reasons do not satisfy the reason why people
create a computer virus?
a. Research purpose
b. Pranks
c. Identity theft
d. Protection
4. Which of the following is not a virus
a. Worm
b. Logic Bomb
c. Winzip
d. Trozan
5. What is the name of the viruses that fool a user into downloading and/or executing them by
pretending to be useful applications?
a. Cracker
b. Worm
c. Trojan horses
d. Keylogger
6. The virus that spread in application software is called as
a. Boot virus
b. Macro virus
c. File virus
d. Anti-virus
7. When does the time bomb occur?
a. During a particular logic and data
b. During a particular time
c. During a particular data or time
d. None of the above
1. We get list of sites after typing a word in search bar called _________
a. Key Phrase
b. Single Word
2. Search Engines maintain heavy database of keywords and urls
a. True
b. False
3. Web search engines stores information about many web pages by a ______.
a. Web Router
b. Web Organizer
c. Web Indexer
d. Web Crawler
4. Web Crawler is also called as __________.
a. Search Optimizer
b. Link Directory
c. Web Manager
d. Web Spider
5. rrange the search engines by their popularity!
1 Bing 2 Yahoo 3 Ask 4. Google
a. 4 3 2 1
b. 4 3 1 2
c. 4 2 3 1
d. 4 2 1 3
6. The facilities available in the internet are
(i) electronic mail (ii) remote login (iii) file transfer (iv) word processing
a. i, ii
b. i, ii, iii
c. i, ii, iv
d. ii, iii and iv
7. Each computer connected to the internet must
a. be an IBM PC
b. have a unique IP address
c. be internet compatible
d. have a modem connection
8. IP addresses are converted to a__________
a. a binary string
b. alphanumeric string
c. a hierarchy of domain names
d. hexadecimal string
9. A web page is located using a
a. Universal Record Linking
b. Uniform Resource Locator
c. Universal Record Locator
d. Uniformly Reachable Links
10. A search engine is a program to search
a. for information
b. web pages
c. web pages for specified index terms
d. web pages for information using specified search terms
11. To search more effectively, you should:
a. use a meta search engine.
b. enclose your search terms in parentheses.
c. use only one word to find sufficient results
d. use multiple words in your search to help narrow the results.
12. Which of these is not a Web browser?
a. Safari
b. Yahoo
c. Chrome
d. Microsoft Edge
13. If you are purchasing a mobile from Amazon.com, which type of E-Commerce, it is
called:
_______________________________
14. The internet also known simply as
a. NAT
b. NOT
c. NET
d. NFT
15. TCP/IP is a:
a. Network Hardware
b. Network Software
c. Protocol
d. None of these
e.