MCQS

Computer Science

The correct answer is 'C. Time bomb' because a logic bomb that is triggered by a time-related event is specifically referred to as a time bomb. This term accurately describes the functionality of the logic bomb in this scenario, as it is set to detonate or activate based on a specific time or date. Therefore, 'time bomb' is the most appropriate and accurate term to describe a logic bomb activated by a time-related event.

The correct answer is 'Cracking' because it specifically refers to unauthorized access to computer systems or networks with malicious intent. This term is commonly used to describe criminal hacking activities, making it the most appropriate choice for the given question. It is important to use the correct terminology when discussing cybercrime to ensure clear communication and understanding.

The correct answer is 'D. All of above' because the storage capacity of a magnetic disk depends on all of the factors listed in the options, including the tracks per inch, bits per inch, disk surface, and disk pack. Each of these factors plays a crucial role in determining the overall storage capacity of a magnetic disk, making 'D. All of above' the correct choice.

The correct answer is 'D. F12' because pressing the F12 key is a common shortcut to display the save-as box in many software applications. This key is specifically designed to open the save-as dialog box, making it the functional key for this action.

The correct answer is 'D. Worm' because a worm is a type of self-replicating program that spreads through computer networks without the need for a host file. This matches the description of a self-replicating program mentioned in the question. Additionally, the reference to the 1970s science fiction novel by John Bruner indicates that the term 'worm' was popularized in the context of computer science by this novel.

The correct answer is 'Firewall' because a firewall is specifically designed to protect a computer network from unauthorized access. It acts as a barrier between the internal network and external threats, filtering incoming and outgoing traffic to prevent malicious activity. Firewalls can be implemented as hardware devices or software programs to effectively safeguard the network from potential security breaches.

The correct answer is 'Microcomputer works faster than Minicomputer' because microcomputers typically have a higher clock speed and processing power compared to minicomputers. This allows microcomputers to perform tasks more quickly and efficiently, making them faster in terms of processing speed. Therefore, this statement accurately reflects the performance difference between minicomputers and microcomputers.

The correct answer is 'C. UDP' because UDP (User Datagram Protocol) is not typically used for accessing the web. UDP is a connectionless protocol that is often used for streaming media, online gaming, and other applications where speed is prioritized over reliability. In contrast, accessing the web typically requires the use of TCP (Transmission Control Protocol), which ensures reliable data transmission.

The correct answer is 'Ctrl Alt Enter' because this specific shortcut key combination is used to split a table in Microsoft Word. Pressing 'Ctrl Alt Enter' will split the table at the selected cell, allowing you to create two separate tables from one. This shortcut is specifically designed for this function in Word, making it the correct choice for splitting a table.

The correct answer is 'D. All Of These' because a compiler is also a translator, a program, and a software tool. A compiler translates high-level programming languages into machine code, it is a program that performs this translation, and it is a software tool used in the development and execution of computer programs.