Operating System - Protection

11:  

Boot strap or vector is called

A.

grappling hook program

B.

main program

C.

secondary program

D.

primary storage

 
 

Option: A

Explanation :

Click on Discuss to view users comments.

Write your comments here:



12:  

The most common approach to authenticating a user identity is

A.

user passwords

B.

user log in

C.

hardware device

D.

none of these

 
 

Option: A

Explanation :

Click on Discuss to view users comments.

Write your comments here:



13:  

Viruses

A.

another form of computer attack is virus

B.

virus are designed to spread into other programs and can wreak havoc in a system

C.

it modifying or destroying files and causing system crashes and program malfunctions

D.

all of these

 
 

Option: D

Explanation :

Click on Discuss to view users comments.

Write your comments here:



14:  

In one time password

A.

the password is different in each instance

B.

the password is same in each instance

C.

both (a) and (b)

D.

none of these

 
 

Option: A

Explanation :

Click on Discuss to view users comments.

Write your comments here:



15:  

Viruses

A.

are usually spread by users downloading viral programs from public bulletin boards or exchanging floppy disks containing an infection

B.

are beneficial for program

C.

both (a) and (b)

D.

none of these

 
 

Option: A

Explanation :

Click on Discuss to view users comments.

Write your comments here: