NUST Entry test NET contains most of the Computer Sciences MCQs. FSC ICS Part 1 Computer book MCQs. HSSC Computer Sciences CS questions MCQs. Solved Chapterwise Computer Sciences MCQs for first-year 11 class MCQs. Second-year and first-year Computer Sciences textbooks chapter-wise MCQs with the answer are provided here. PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations
PLS Boost Bundle
Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

6. viruses infects the first sector of disk:
1/20

10. is not an anti-virus program:
2/20

5. Most common crimes are committed by:
3/20

14. Another name for antivirus is:
4/20

13. Types of software that can be freely distributed without violating copyright laws are called:
5/20

8. Format C is an example of virus:
6/20

1. A virus program usually hidden in:
The Operating system or application programs
7/20

9. Software that is used to detect and remove the viruses from the computer is called:
8/20

3. A virus can destroy: (
9/20

10/20

20. media is used for backup:
11/20

17. Which is not an antivirus program?
12/20

19. What is the most common computer crime of these listed below?
13/20

7. virus is activated on the basis of a logical condition:
14/20

16. A secret word or number to be typed by a keyboard before an activity can take place are called:
15/20

15. Security Protection for personal computer include:
16/20

17/20

11. is an anti-virus program:
18/20

4. Viruses are transferred from one computer to another due to:
Exchange of data and programs
19/20

18. Format C is an example of:
20/20