ODISHA ADARSHA VIDYALAYA, JAMKANI
PT-1 FM-40
SUB-COMPUTER SCIENCE CLASS-VIII TIME-1.5HR
1. Fill in the blanks with correct option. [1x10]
[Trojan horse, Malware, Spam, Virus, Spoofing, Worm, Hacker,Brain,
Mydoom, Real time]
(a)________is unwanted e-mails, MMS and SMS.
(b)_______ Program erase your hard disk.
(c) ________is a program that acts as a malicious or harmful code.
(d)_________is a fasted spreading E-mail worm.
(e)A________ is a standalone malware computer program that replicates itself
in order to spread other computers.
(f)___________is an example of boot sector virus.
(g)Rat is an example of ______________.
(h)________type of scam where an intruder attempts to gain unauthorized access
to a user system.
(i) Cyber stalking can include monitor someone’s activity IN ________.
(j)The people who are extremely interested to explore computer and network
system are called _____________.
Q2. Match the Column A with Column B. [1×10]
Column A Column B
.SYS Trojan Horse
WannaCry file virus
Spyware Worm
BRONTOK Key Logger
RAT Ransom ware
Anti virus black hat hacker
Cracker illegal copying
Software piracy quick heal
Cyber cri illegal activity
Boot sector virus stoned
3. short type question. ANY FIVE [2x5]
a. what is malware.
b. what is online fraud.
c. what is cipher text.
d. what is spyware.
e. what is virus.
f. what is worm.
4. long type question. Any two [5x2=10]
a.what is firewall? Write its uses.
b. what is hacking and cracking.
c. what is cryptography.
ODISHA ADARSHA VIDYALAYA, JAMKANI
PT-1 FM-40
SUB-COMPUTER SCIENCE CLASS-VIII TIME-1.5HR
1. Fill in the blanks with correct option. [1x10]
[Trojan horse, Malware, Spam, Virus, Spoofing, Worm, Hacker,Brain,
Mydoom, Real time]
(a)________is unwanted e-mails, MMS and SMS.
(b)_______ Program erase your hard disk.
(c) ________is a program that acts as a malicious or harmful code.
(d)_________is a fasted spreading E-mail worm.
(e)A________ is a standalone malware computer program that replicates itself
in order to spread other computers.
(f)___________is an example of boot sector virus.
(g)Rat is an example of ______________.
(h)________type of scam where an intruder attempts to gain unauthorized access
to a user system.
(i) Cyber stalking can include monitor someone’s activity IN ________.
(j)The people who are extremely interested to explore computer and network
system are called _____________.
Q2. Match the Column A with Column B. [1×10]
Column A Column B
.SYS Trojan Horse
WannaCry file virus
Spyware Worm
BRONTOK Key Logger
RAT Ransom ware
Anti virus black hat hacker
Cracker illegal copying
Software piracy quick heal
Cyber cri illegal activity
Boot sector virus stoned
3. short type question. ANY FIVE [2x5]
a. what is malware.
b. what is online fraud.
c. what is cipher text.
d. what is spyware.
e. what is virus.
f. what is worm.
4. long type question. Any two [5x2=10]
a.what is firewall? Write its uses.
b. what is hacking and cracking.
c. what is cryptography.