Templates by BIGtheme NET

FPSC Solved MCQs For Customs Inspector Test Preparation

Ads By Google

FPSC Solved MCQs For Customs Inspector Test Preparation

These are solved questions that will help you to prepare the test of Customs inspectors FPSC test so you can prepare your test online here as these are most common MCQs that have been repeated in past years of NTS/FPSC test so prepare these question well .

FPSC Solved MCQs For Customs Inspector Test Preparation

FPSC Solved MCQs For Customs Inspector Test Preparation

(1) I virus that replicates it self is called====================== Worm 

(2) Free software is also called ============================Public domain softaware

(3) vaccine is also called ================================= Antivirus

(4) The secret word or activity before performing an activity =========Passwords

(5) Word processing.electronic filling  and email are part of =========Automation

(6)An system where activities are processed as they occur===========Transaction Processing System

(7)A portion of operating system is loaded in memory =============Booting

Ads By Google

(8) One form of build in software protection for data is called =========user profile

(9) A device that prevents the electrical problems from affecting data files========Surge Protector

(10) The weakest link in computers are called ========================People in it 

(11) Authorization that make multiple software copies are called =============Site Licensing 

(12) Software piracy includes ===========================Program Duplication 

(13) The key factor in computer installation that has to met the disaster is called =======Loss of procession ability 

(14) The “what you are ” criterion in computers is called ==============Bio Metrics

(15) Computers crimes are discovered ======================Accidently

(16) The modification of grades before in file is called ==============Data Diddling 

(17) The legislation that prohibits to keep secret files is called =========Fedral Privacy Act

(18) A way against theft or alteration of data is called ==============DES

(19) A computer dedicated to screening access to network from outside the network ======Firewell

(20) A computer crime in which money is embezzled in small amount over time is called =============The Salami Technique

 

Leave a Reply

Your email address will not be published. Required fields are marked *

*