Computer Virus Class 7 MCQ Quiz With Answers

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
By SabeenHHS
S
SabeenHHS
Community Contributor
Quizzes Created: 8 | Total Attempts: 30,738
| Attempts: 21,777 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. When the virus attacks, the computer applications run normally.

Explanation

When a virus attacks, it can disrupt the normal functioning of computer applications. It can cause them to crash, freeze, or behave erratically. Therefore, the statement that computer applications run normally when the virus attacks is false.

Submit
Please wait...
About This Quiz
Computer Virus Class 7 MCQ Quiz With Answers - Quiz

Are you ready for this computer virus class 7 MCQ quiz? The computer has become an essential tool of our lives in this modern world. We do much... see moreof our work through computers. But, the one risk that makes computers unsafe and insecure for us is a virus. This quiz deals with that topic. Here, we will test your computer virus knowledge and see how much more you have to learn. Let's go!. see less

2. Which refers to unsolicited, unwanted mail?

Explanation

Spam refers to unsolicited, unwanted mail. It is typically sent in bulk to a large number of recipients without their consent. Spam emails often contain advertisements, promotions, or fraudulent messages. They can be annoying, intrusive, and potentially harmful as they may contain viruses or phishing attempts. Therefore, the correct answer is "Spam."

Submit
3. The trojan is actually programmed to pass the user's data to someone else.

Explanation

The correct answer is "True" because a trojan is a type of malware that disguises itself as a legitimate program but actually performs malicious actions, such as stealing and transmitting the user's data to another person or entity without their knowledge or consent. Therefore, the statement accurately describes the behavior of a trojan.

Submit
4. Which program spreads itself by means of the network?

Explanation

Worms are a type of malicious software that can spread themselves through computer networks without any user interaction. Unlike viruses, worms do not need to attach themselves to a host program or file to propagate. Instead, they can independently replicate and spread across a network, infecting other computers and devices. This makes worms a particularly dangerous and fast-spreading form of malware.

Submit
5. Which virus infects program files like having an ".EXE" extension?

Explanation

A program virus is a type of virus that infects program files with an ".EXE" extension. This means that when a user runs an infected program, the virus will also execute and potentially cause harm to the system. Unlike boot viruses, which infect the boot sector of a computer's hard drive, program viruses specifically target executable files. Trojan horses and malware are also types of malicious software, but they may not necessarily infect program files exclusively.

Submit
6. This is not antivirus software.

Explanation

not-available-via-ai

Submit
7.  If the files are saved in _____, then the virus cannot infect them.

Explanation





Option C is the correct Answer.

A. USB: USB drives can be written to and thus can be infected by a virus12. C. Memory card: Similar to USB drives, memory cards can also be written to and can be infected by a virus34. D. All of them: As explained above, both USB drives and memory cards can be infected by a virus, so this option is incorrect.



On the other hand, CD-ROMs are read-only memory, meaning data can be read from them but not written to them. Therefore, once data has been written to a CD-ROM, it cannot be modified or infected by a virus. However, it’s important to note that if the data was infected before it was written to the CD-ROM, the virus will still be present. So, while a virus cannot infect files once they are on the CD-ROM, the files can carry a virus if they were infected before being saved to the CD-ROM.
Submit
8. What is another name for Tracking Software?

Explanation

Both A & B refer to Spybots and Spyware. Spybots and Spyware are both types of tracking software that can be used to monitor and track activities on a computer or device. Spybots are specifically designed to collect information without the user's knowledge or consent, while Spyware is a broader term that encompasses any software that is designed to gather information about a person or organization without their knowledge. Therefore, the correct answer is Both A & B.

Submit
9. Which type of virus infects data files?

Explanation

A macro virus is a type of virus that infects data files. Unlike other viruses that typically infect executable files, macro viruses infect files that contain macro code, such as documents or spreadsheets. When these infected files are opened, the macro virus is activated and can spread to other files on the system. This type of virus is often spread through email attachments or shared files, and can cause damage by corrupting or deleting data.

Submit
10. The database of viruses that antivirus software scans for:

Explanation

The correct answer is "Virus Definitions" because antivirus software relies on a database of known viruses to identify and remove malicious software from a computer. These virus definitions contain specific information about the characteristics and behavior of different viruses, allowing the antivirus software to detect and eliminate them. Without regularly updated virus definitions, antivirus software would not be able to effectively protect against new and emerging threats. Therefore, the database of viruses that antivirus software scans for are referred to as "Virus Definitions".

Submit
View My Results
Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline (Updated): Aug 16, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 16, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Feb 15, 2016
    Quiz Created by
    SabeenHHS
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
When the virus attacks, the computer applications run normally.
Which refers to unsolicited, unwanted mail?
The trojan is actually programmed to pass the user's data to...
Which program spreads itself by means of the network?
Which virus infects program files like having an ".EXE"...
This is not antivirus software.
 If the files are saved in _____, then the virus cannot infect...
What is another name for Tracking Software?
Which type of virus infects data files?
The database of viruses that antivirus software scans for:
Alert!

Advertisement