Category Archives: Computer MCQs

A Program that performs a useful task while Simultaneously allowing destructive acts is a ?

A. Worm.
B. Trojan horse.
C. Virus.
D. Macro virus

Collecting personal information and effectively posing as another individual is known as the crime of ?

A. Spooling.
B. Identity theft.
C. Spoofing.
D. Hacking.

The common name for the crime of stealing passwords is ?

A. Jacking.
B. Identity theft.
C. Spoofing.
D. Hacking.

The typical computer criminal is a(n) ?

A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.

Large transaction processing systems in automated Organization’s use ?

A. Online processing
B. Batch Processing
C. Once-a-day Processing
D. End-of-day processing

Which of the following contains permanent data and gets updated during the processing of transactions?

A. Operating System File
B. Transaction file
C. Software File
D. Master file