100% found this document useful (1 vote)
188 views4 pages

PT 1 Viii Ict

(a) This document contains a computer science exam for class 8 with questions about cyber security topics like malware, viruses, worms, hacking and cryptography. (b) The questions include multiple choice, matching, short answer and long answer questions. In the multiple choice, students are asked to fill in the blanks with types of malware, hackers and cyber threats. (c) The matching questions match malware types like trojan horses and ransomware with their names. The short questions ask about definitions of malware, online fraud, cipher text, spyware and viruses. The long questions ask students to define firewalls and their uses or hacking/cracking and cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
188 views4 pages

PT 1 Viii Ict

(a) This document contains a computer science exam for class 8 with questions about cyber security topics like malware, viruses, worms, hacking and cryptography. (b) The questions include multiple choice, matching, short answer and long answer questions. In the multiple choice, students are asked to fill in the blanks with types of malware, hackers and cyber threats. (c) The matching questions match malware types like trojan horses and ransomware with their names. The short questions ask about definitions of malware, online fraud, cipher text, spyware and viruses. The long questions ask students to define firewalls and their uses or hacking/cracking and cryptography.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

ODISHA ADARSHA VIDYALAYA, JAMKANI

PT-1 FM-40
SUB-COMPUTER SCIENCE CLASS-VIII TIME-1.5HR

1. Fill in the blanks with correct option. [1x10]


[Trojan horse, Malware, Spam, Virus, Spoofing, Worm, Hacker,Brain,
Mydoom, Real time]
(a)________is unwanted e-mails, MMS and SMS.
(b)_______ Program erase your hard disk.
(c) ________is a program that acts as a malicious or harmful code.
(d)_________is a fasted spreading E-mail worm.
(e)A________ is a standalone malware computer program that replicates itself
in order to spread other computers.
(f)___________is an example of boot sector virus.
(g)Rat is an example of ______________.
(h)________type of scam where an intruder attempts to gain unauthorized access
to a user system.
(i) Cyber stalking can include monitor someone’s activity IN ________.
(j)The people who are extremely interested to explore computer and network
system are called _____________.

Q2. Match the Column A with Column B. [1×10]


Column A Column B
.SYS Trojan Horse
WannaCry file virus
Spyware Worm
BRONTOK Key Logger
RAT Ransom ware
Anti virus black hat hacker
Cracker illegal copying
Software piracy quick heal
Cyber cri illegal activity
Boot sector virus stoned
3. short type question. ANY FIVE [2x5]
a. what is malware.
b. what is online fraud.
c. what is cipher text.
d. what is spyware.
e. what is virus.
f. what is worm.

4. long type question. Any two [5x2=10]


a.what is firewall? Write its uses.
b. what is hacking and cracking.
c. what is cryptography.
ODISHA ADARSHA VIDYALAYA, JAMKANI
PT-1 FM-40
SUB-COMPUTER SCIENCE CLASS-VIII TIME-1.5HR

1. Fill in the blanks with correct option. [1x10]


[Trojan horse, Malware, Spam, Virus, Spoofing, Worm, Hacker,Brain,
Mydoom, Real time]
(a)________is unwanted e-mails, MMS and SMS.
(b)_______ Program erase your hard disk.
(c) ________is a program that acts as a malicious or harmful code.
(d)_________is a fasted spreading E-mail worm.
(e)A________ is a standalone malware computer program that replicates itself
in order to spread other computers.
(f)___________is an example of boot sector virus.
(g)Rat is an example of ______________.
(h)________type of scam where an intruder attempts to gain unauthorized access
to a user system.
(i) Cyber stalking can include monitor someone’s activity IN ________.
(j)The people who are extremely interested to explore computer and network
system are called _____________.

Q2. Match the Column A with Column B. [1×10]


Column A Column B
.SYS Trojan Horse
WannaCry file virus
Spyware Worm
BRONTOK Key Logger
RAT Ransom ware
Anti virus black hat hacker
Cracker illegal copying
Software piracy quick heal
Cyber cri illegal activity
Boot sector virus stoned
3. short type question. ANY FIVE [2x5]
a. what is malware.
b. what is online fraud.
c. what is cipher text.
d. what is spyware.
e. what is virus.
f. what is worm.

4. long type question. Any two [5x2=10]


a.what is firewall? Write its uses.
b. what is hacking and cracking.
c. what is cryptography.

You might also like