COMPUTER
Computer Most repeated MCQs, MS Excel Most repeated MCQs, MS Word Most repeated MCQs, MS PowerPoint Most repeated MCQs for CSS, PMS, Inspector, ASI, Sub-inspector, Constable, FPSC, PPSC, ETEA, FIA, Police, Army, Navy, Airforce, IB, MOFA, ASF, LHC, Educators all other competitive exams and govt, private Jobs. most of these questions are also discussed on Pakmcqs official and Testpoint.pk. you can read the most repeated 100 MCQs, these questions get from past papers. If you want to download these most important Computer MCQs in PDF click mentioned button.
پی ڈی ایف میں ڈنلوڈ کرنے کے لیےاس لنک پر کلک کریں۔
Show Answers
چار آپشن میں سے کسی ایک پر کلک کرنے سے جواب سرخ ہو جائے گا۔
Provide remote control for an attacker to use an infected machine.
Investigate the infected user’s local network.
Steal sensitive data.
All of the above
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
میلویئر حملہ آور کو متاثرہ مشین استعمال کرنے کے لیے ریموٹ کنٹرول فراہم کرتا ہے۔
میلویئر متاثرہ صارف کے مقامی نیٹ ورک کی چھان بین کرتا ہے۔
میلویئر حساس ڈیٹا چوری کرتا ہے۔
Ronets
Botnets
Botwork
Rowork
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Botnets are highly versatile and adaptable , able to maintain resilience through redundant servers and by using infected computers to relay traffic.
changed to an IP address
changed to network
changed location
None of these
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
VPN are also used for hides users’ physical location.
VPN masks your IP address.
A VPN can hide a user’s browsing activity.
There are 6 types of VPN protocols.
There are 2 types of VPNs.
Challenge Hardware authentication protocol
Challenge Handshake authentication protocol
Circuit Hardware authentication protocol
Circuit Handshake authentication protocol
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
CHAP is used for verifies the identity of the client by using a three-way handshake.
Server side programming
Client side programming
Both a and b
None of the mentioned
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Cookies were originally designed for server-side programming,
and at the lowest level, they are implemented as an extension to the HTTP protocol.
Store contents of electronic shopping carts
To track web activity
Store your ID and password for subsequent logons to the site
All of these
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Cookies are text files with small pieces of data such as a username and password etc. The purpose of the computer cookie is to help the website keep track of your visits and activity. That is used to identify your computer as you use a computer network. Specific cookies known as HTTP cookies are used to identify specific users and improve your web browsing experience.
.dos
.docs
.docx
None of the above
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Dennis Ritchie is the father of MS-DOS.
MS-DOS was developed in 1982.
MS-Dos stand for Microsoft Disk Operating System
********
if you know about correct answer plz comment or WhatsApp 0308253300
1970
1978
1982
1984
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Dennis Ritchie is the father of MS-DOS.
MS-DOS was developed in 1982.
MS-Dos stand for Microsoft Disk Operating System
Gary Kildall
Dennis Ritchie
Dennis Ritchie
None of these
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Dennis Ritchie is the father of MS-DOS.
MS-DOS was developed in 1982.
MS-Dos stand for Microsoft Disk Operating System
Machine program
Assembly program
Source code
Subset
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Source code is the set of instructions written by a programmer using various programming languages. Source Code is generally written in English though it may vary from one computer to another.