UGC NET Paper 1 — Computer Science
582 questions across 12 years
Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.
By year
By topic
Practice questions
6 questions shown from 2022 in Cyber Security.
Which type of virus or destructive software could appear to be useful, but will actually cause damage once installed or run by a user?
Programs that come into a computer system disguised as something else, are called:
Which of the following statements about malware are true? (A) A Trojan Horse is malware disguised as legitimate software. (B) A Virus inserts itself into another program. It runs a...
Which of the following statements is correct in the context of malware? (A) A Trojan horse is a malware that masquerades as legitimate software. (B) A virus infiltrates another pro...
Given below are two statements: One is labelled as Assertion (A) and the other is labelled as Reason (R): Assertion (A): The Internet of Things (IoT) is a rapidly evolving technolo...
What is the purpose of Block Chain?