Computer Virus Class 7 MCQ Quiz With Answers

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS (Computer Science) |
Database Administrator
Review Board Member
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.
, MS (Computer Science)
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By SabeenHHS
S
SabeenHHS
Community Contributor
Quizzes Created: 8 | Total Attempts: 29,698
Questions: 10 | Attempts: 21,035

SettingsSettingsSettings
Computer Virus Class 7 MCQ Quiz With Answers - Quiz

Are you ready for this computer virus class 7 MCQ quiz? The computer has become an essential tool of our lives in this modern world. We do much of our work through computers. But, the one risk that makes computers unsafe and insecure for us is a virus. This quiz deals with that topic. Here, we will test your computer virus knowledge and see how much more you have to learn. Let's go!.


Questions and Answers
  • 1. 

     If the files are saved in _____, then the virus cannot infect them.

    • A.

      USB

    • B.

      CD-ROMs

    • C.

      Memory card

    • D.

      All of them

    Correct Answer
    B. CD-ROMs
    Explanation
    Option C is the correct Answer.
    A. USB: USB drives can be written to and thus can be infected by a virus12. C. Memory card: Similar to USB drives, memory cards can also be written to and can be infected by a virus34. D. All of them: As explained above, both USB drives and memory cards can be infected by a virus, so this option is incorrect.

    On the other hand, CD-ROMs are read-only memory, meaning data can be read from them but not written to them. Therefore, once data has been written to a CD-ROM, it cannot be modified or infected by a virus. However, it’s important to note that if the data was infected before it was written to the CD-ROM, the virus will still be present. So, while a virus cannot infect files once they are on the CD-ROM, the files can carry a virus if they were infected before being saved to the CD-ROM.

    Rate this question:

  • 2. 

    Which refers to unsolicited, unwanted mail?

    • A.

      Spybot

    • B.

      Spam

    • C.

      Drafts

    • D.

      Inbox

    Correct Answer
    B. Spam
    Explanation
    Spam refers to unsolicited, unwanted mail. It is typically sent in bulk to a large number of recipients without their consent. Spam emails often contain advertisements, promotions, or fraudulent messages. They can be annoying, intrusive, and potentially harmful as they may contain viruses or phishing attempts. Therefore, the correct answer is "Spam."

    Rate this question:

  • 3. 

    This is not antivirus software.

    • A.

      Avira

    • B.

      Panda

    • C.

      Avast

    • D.

      Beast

    Correct Answer
    D. Beast
  • 4. 

    Which virus infects program files like having an ".EXE" extension?

    • A.

      Boot Virus

    • B.

      Trojan Horse

    • C.

      Program Virus

    • D.

      Malware

    Correct Answer
    C. Program Virus
    Explanation
    A program virus is a type of virus that infects program files with an ".EXE" extension. This means that when a user runs an infected program, the virus will also execute and potentially cause harm to the system. Unlike boot viruses, which infect the boot sector of a computer's hard drive, program viruses specifically target executable files. Trojan horses and malware are also types of malicious software, but they may not necessarily infect program files exclusively.

    Rate this question:

  • 5. 

    The trojan is actually programmed to pass the user's data to someone else.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The correct answer is "True" because a trojan is a type of malware that disguises itself as a legitimate program but actually performs malicious actions, such as stealing and transmitting the user's data to another person or entity without their knowledge or consent. Therefore, the statement accurately describes the behavior of a trojan.

    Rate this question:

  • 6. 

    When the virus attacks, the computer applications run normally.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    When a virus attacks, it can disrupt the normal functioning of computer applications. It can cause them to crash, freeze, or behave erratically. Therefore, the statement that computer applications run normally when the virus attacks is false.

    Rate this question:

  • 7. 

    Which program spreads itself by means of the network?

    • A.

      Worms

    • B.

      Trojan Horse

    • C.

      Spyware

    • D.

      Spybots

    Correct Answer
    A. Worms
    Explanation
    Worms are a type of malicious software that can spread themselves through computer networks without any user interaction. Unlike viruses, worms do not need to attach themselves to a host program or file to propagate. Instead, they can independently replicate and spread across a network, infecting other computers and devices. This makes worms a particularly dangerous and fast-spreading form of malware.

    Rate this question:

  • 8. 

    What is another name for Tracking Software?

    • A.

      Spybots

    • B.

      Spyware

    • C.

      None of them

    • D.

      Both A & B

    Correct Answer
    D. Both A & B
    Explanation
    Both A & B refer to Spybots and Spyware. Spybots and Spyware are both types of tracking software that can be used to monitor and track activities on a computer or device. Spybots are specifically designed to collect information without the user's knowledge or consent, while Spyware is a broader term that encompasses any software that is designed to gather information about a person or organization without their knowledge. Therefore, the correct answer is Both A & B.

    Rate this question:

  • 9. 

    The database of viruses that antivirus software scans for:

    • A.

      Computer virus

    • B.

      Virus Definitions

    • C.

      Program virus

    • D.

      None of them

    Correct Answer
    B. Virus Definitions
    Explanation
    The correct answer is "Virus Definitions" because antivirus software relies on a database of known viruses to identify and remove malicious software from a computer. These virus definitions contain specific information about the characteristics and behavior of different viruses, allowing the antivirus software to detect and eliminate them. Without regularly updated virus definitions, antivirus software would not be able to effectively protect against new and emerging threats. Therefore, the database of viruses that antivirus software scans for are referred to as "Virus Definitions".

    Rate this question:

  • 10. 

    Which type of virus infects data files?

    • A.

      Macro Virus

    • B.

      Program Virus

    • C.

      Boot Virus

    • D.

      Spam

    Correct Answer
    A. Macro Virus
    Explanation
    A macro virus is a type of virus that infects data files. Unlike other viruses that typically infect executable files, macro viruses infect files that contain macro code, such as documents or spreadsheets. When these infected files are opened, the macro virus is activated and can spread to other files on the system. This type of virus is often spread through email attachments or shared files, and can cause damage by corrupting or deleting data.

    Rate this question:

Godwin Iheuwa |MS (Computer Science) |
Database Administrator
Godwin Iheuwa, a Database Administrator at MTN Nigeria, holds an MS in Computer Science, specializing in Agile Methodologies and Database Administration from the University of Bedfordshire and a Bachelor's in Computer Science from the University of Port Harcourt. His proficiency in SQL Server Integration Services (SSIS) and SQL Server Management Studio contributes to his expertise in database management.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 16, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Feb 15, 2016
    Quiz Created by
    SabeenHHS
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.