Computer Security Multiple Choice Questions with Answers – Part 4

Computer Security Questions MCQ Answers Techhyme

Technology is growing day by day and the entire world is its grasp. We cannot imagine even a day without electronic devices around us. With the use of this growing technology, invaders, hackers and thieves are trying to harm our computer’s security for monetary gains, recognition purposes, ransom demands, bullying others, invading into other businesses, organizations, etc.

Our 200+ MCQs focus on all topics of the Computer Security subject, covering 10+ topics such as Network Security, Hacking, Cyber Security, Wireless, System Security etc.

Also Read:

This will help you to prepare for exams, contests, online tests, quizzes, viva-voce, interviews, and certifications. You can practice these MCQs starting from the Part 1 to Part 4 or you can jump to any set of your choice.

Each set contains 50 questions based on multiple options and all the answers are mentioned at the end of the article.

1. IC stands for-

  • A. Integrated Circuit
  • B. Information Code
  • C. Interchange Code
  • D. Intermediate Circuit

2. The term ‘Hardware’ refers to________ of computer.

  • A. Software
  • B. Programming
  • C. Physical Component
  • D. IC

3. DBMS stands for

  • A. Direct Base Management System
  • B. Double Base Management System
  • C. Database Management System
  • D. Derived Base Management System

4. The control software of the computer is

  • A. Operating system
  • B. software installed
  • C. Hard Disk
  • D. Data

5. Which one is not the option of Operating System ?

  • A. UNIX
  • B. MAC OS
  • C. IBM OS/2
  • D. CPM

6. The Operating System which allows more than one user to work on the same computer is

  • A. Multi-programming operation system
  • B. Multi-file, operating system
  • C. Multi-user operating system
  • D. Single-user operating system

7. Database is collection of ______________ information.

  • A. inter-related
  • B. extra
  • C. ordinary
  • D. different

8. A collection of related records is called a

  • A. Collected data
  • B. file
  • C. high-level information
  • D. none of the above

9. The function of Data Manipulation is(in DBMS)

  • A. retrieval of information
  • B. deletion of unnecessary records
  • C. insertion of new records
  • D. All of the above

10. The Dbase III+ , is mostly used for

  • A. Office Automation
  • B. Scientific Problems
  • C. Database Management Problems
  • D. None of the above

11. In a Dbase III+, the fields of a table may be of

  • A. Alphanumeric
  • B. Numeric
  • C. Boolean
  • D. All of the above

12. In DBMS, DML stands for:

  • A. Data Main Language
  • B. Derive Main Language
  • C. Data Manipulation Language
  • D. None of the above

13. Which one is not the option of Translator ?

  • A. Assembler
  • B. UNIX
  • C. Compiler
  • D. Interpreter

14. To convert a high-level language to machine code, used device is

  • A. Interpreter Coding
  • B. Chip
  • C. XENIX
  • D. Compiler

15. The VIRUS is a

  • A. software program
  • B. hardware
  • C. simple machine
  • D. code

16. Virus detection and control system are:

  • A. Protection system
  • B. Vaccine programme
  • C. Both (1) and(2)
  • D. None of the above

17. Which one is not option of multiuser operating system

  • A. UNIX
  • C. PC-DOS
  • D. Netware

18. The DBMS has a special Buffer storage that contains data to be-

  • A. access
  • B. read
  • C. transmitted
  • D. All of tie above

19. The language used in second generation was-

  • A. assembly language
  • B. high-level language
  • C. code language
  • D. special language

20. The language s comes under fourth generation are:

  • A. Oracle
  • B. Ingles
  • C. Object-oriented language
  • D. All of the above

21. VIRUS are

  • A. self-replicating programme
  • B. self-dependent programme
  • C. special codes
  • D. None of the above

22. The operating system is also known as

  • A. Special system
  • B. Control division
  • C. Administration division
  • D. None of the above

23. In DBMS, the term ‘table’ refers to

  • A. Attributes of records
  • B. Physical address of records
  • C. Both (1) and(2)
  • D. None of the above

24. In DBMS, the database language DDL is

  • A. Data Deriving Language
  • B. Data Definition Language
  • C. Data-Data Language
  • D. None of the above

25. The primary goal of Database management system is to

  • A. store information
  • B. retrieve information
  • C. both (1 and(2)
  • D. None of the above

26. The language that is understandable to computer is

  • A. Machine language
  • B. high-level language
  • C. English language
  • D. None of the above

27. The fastest translator used for converting high-level language is

  • A. Interpreter
  • B. Compiler
  • C. Assembler
  • D. All of the above

28. The languages come under Third Generation are

  • A. Bah
  • B. C
  • C. COBOL
  • D. All of the above

29. VIRUS can be spread by

  • A. Networks
  • B. Modem
  • C. Floppies
  • D. All of the above

30. VIRUS are classified as

  • A. Boot Infectors
  • B. System Infectors
  • C. General EXE and Com infectors
  • D. None of the above

31. To escape from the problem and severe damage because VIRUS, we prefer a software that is

  • A. Anti virus
  • B. Special programme
  • C. Code
  • D. None of the above

32. ‘NORTON’ is an

  • A. Software
  • B. Anti-virus
  • C. Language
  • D. Codes

33. The virus which themselves attach with the operating system of computer is

  • A. Boot Infector
  • B. EXE Infector
  • C. System Infector
  • D. None of the above

34. The term “Boot” refers to:

  • A. start up a computer
  • B. loading software in computer
  • C. managing memory of computer
  • D. All of the above

35. The system file of an operating system:

  • A. EXE
  • B. COM
  • C. DOT
  • D. Both (1) and (2)

36. Which among the following is not a security/ privacy risk ?

  • A. Spam
  • B. Hacking
  • C. Virus
  • D. Phishing
  • E. Vishing

37. Now a days Vishing has become a criminal practice of using social engineering over which of the following ?

  • A. Social networking sites
  • B. Telephones
  • C. E-mails
  • D. Cyber cafes
  • E. All of the above

38. When some unidentified/ unknown person/firm sends you mail in a trustworthy/lucrative way asking for sensitive banks and online payment information,this is a case of- ?

  • A. spam
  • B. hacking
  • C. Phishing
  • 4.Vishing
  • E. Simulation

39. Which among the following is a correct definition of “Digital Divide” ?

  • A. gap between people having access to mobile and internet access
  • B. gap between people having access to internet/IT and no internet/IT
  • C. gap between people having access to broadband and narrowband internet
  • D. gap between people having access to internet banking and normal banking
  • E. Gap between the people having an email account and no email account

40. Which among the following is the most common source of Viruses to the hard disk of your computer ?

  • A. Incoming Email
  • B. Outgoing Email
  • C. CD ROMs
  • D. Websites
  • E. Mobile

41. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as….

  • A. software suites
  • B. integrated software packages
  • C. software processing packages
  • D. personal information managers
  • E. none of these

42. A data warehouse is which of the following ?

  • A. Can be updated by the end users
  • B. Contains numerous naming conventions and formats
  • C. Organized around important subject areas
  • D. Contains only current data
  • E. None of these

43. ____________ services store and manages files for network users.

  • A. Authentication
  • 2.Main
  • C. Web
  • D. File
  • E. None of these

44. All of the following are examples of real security and privacy risks Except _________________

  • A. hackers
  • B. spam
  • C. viruses
  • D. identify
  • E. None of these

45.______________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems

  • A. Data
  • B. Sales
  • C. Query
  • D. Point-of-sale(POS)
  • E. None of these

46. The OSI model is divided into __________ processes called layers.

  • A. five
  • B. six
  • C. seven
  • D. eight
  • E. None of these

47. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.

  • A. management
  • B. processing
  • C. utility
  • D. application
  • E. None of these

48. _________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.

  • A. Servers
  • B. Embedded computers
  • C. Robotic computers
  • D. Mainframes
  • E. None of these

49. The following are all computing devices, except ____________

  • A. notebook computers
  • B. cellular telephones
  • C. digital scanners
  • D. personal digital assistants
  • E. None of these

50. In a ring topology, the computer in possession of the ____________ can transmit data

  • A. packet
  • B. data
  • C. access method
  • D. token
  • E. None of these


  1. A
  2. C
  3. C
  4. A
  5. D
  6. C
  7. A
  8. B
  9. D
  10. C
  11. D
  12. C
  13. B
  14. D
  15. A
  16. C
  17. C
  18. D
  19. A
  20. D
  21. A
  22. B
  23. C
  24. B
  25. C
  26. A
  27. B
  28. D
  29. D
  30. D
  31. A
  32. B
  33. C
  34. A
  35. D
  36. A
  37. B
  38. C
  39. B
  40. A
You may also like:

Related Posts