JSC ICT Model Test 2019

Progress Test 2019
Class Eight
Sub: Information and Communication Technology(ICT)
Time: 1 Hour                                                                                                                                                                                   Full Marks: 45
Part-A: 10
Answer any two of the following questins

1. What is the captcha? What do you understand by online identity?
2. What is hacking? Describe.
3. What are the types of computer virus and what?
4. What is Malware? What is the way to get rid of Malware?
5. What is cyber crime? Explain it.

Part-B: 35

Progress Test 2019
Class Eight
Sub: Information and Communication Technology(ICT)
Namet . . . . . . . . . . . . . . . . . . . . .. . . .Section:   . . . . . . . . . . . . Roll No: . . . . . . . .

Fill the correct / best answer circle with black ball point pen pen. The value of each question is -1.


1. Which of the following is harmful software?
(a) Mozilla Firefox
(b) Download Manager
(c) Trojan horse
(d) Operamini
2. Which of the following prevents hacking?
(a) Firewall  (b) Captcha
(c) Antivirus
(d) Bijoy software
3.  No one is isolated from others because of---
(a) Computer (b) Network
(c) Movies     (d) Television
4. A hacker hacks other’s computers for—
i. Earn illegally
ii. Harm a person
iii. humiliate an organization
Which one is correct?
(a) i and ii      (b) i and iii
(c) ii and iii   (d) i, ii and iii
5. We should take the help of ICT to make our life…
i. Beautiful    ii. Easy iii. Productive
Which one is correct?
(a) i and ii      (b) i and iii
(c) ii and iii   (d) i, ii and iii
6. Which is the invisible security wall?
(a) Password (b) Captcha
(c) Firewall   (d) Woodwall
7. Which one of the following is database software?
(a) Mac OS    (b) Libra Office
(c) MySQL    (d) Obontu
8. What is the name of the database?
(a) Datacenter (b) Dataview
(c) Datazone (d) data area
9. Any work in computer is done through---
(a) Typing      (b) programming
(c) Composing (d) Editing
10. Office Management softwares are—
i. MS office   ii. Open Office iii. Libra Office
Which one is correct?
(a) i and ii      (b) i and iii
(c) ii and iii   (d) i, ii and iii
11. Website browsers are---
i. Google
ii. Mozila Firefox
iii. Google Chrome
Which one is correct?
(a) i and ii      (b) i and iii
(c) ii and iii   (d) i, ii and iii
12. Which of the following is Virus?
(a) Trojan Horse
(b) Computer virus
(c) Adware    (d) Nimda
13. Which of the following is the first internet worm?
(a) Morris worm
(b) Coputer worm
(c) Malicious software
(d) Rootkits
14. Computer virus attack the—
(a) Executable file
(b) Security fault
(c) Operating system
(d) Customize program
15. Which operating system contain the most of malware?
(a) Mac OS    (b) Linux      
(c) Windows (d) Xenix
16. In which date CIH attacks?
(a) 26 March (b) 26 April
(c) 26May      (d) 26 June
17. Which one is the self replicating program?
(a) Malware   (b) Virus
(c) Exe File    (d) Reaper virus
18. Which scientist first named virus?
(a) Fredrick B Cohen
(b) John Von Newman
(c) John Lehman
(d) Charles babedge
19. When a virus Elk Cloner started?
(a) In 1975     (b) In 1982
(c) In 1978     (d) In 1980
20. Which of the following software has done any special work?
(a) Application software
(b) Computer virus
(c) Malware
(d) Trojan horse
21. When was the devastating virus exposed?
(a) 1982         (b) 1985
(c) 1986         (d) 1991  
22. Spyware and adware do not have any---
(a) Devastating power
(b) Power of replication
(c) Power of spread
(d) Power to born
23. Computer virus damage the system in the way of---
i. Reducing speed
ii. Hanging or freezing
iii. Rebooting
Which one is correct?
(a) i and ii      (b) i and iii
(c) ii and iii   (d) i, ii and iii
24. Which virus formatted the hard disk?
(a) Nimda virus
(b) CIH virus
(c) Daprosy worm
(d) Code Red Worm
25. A virus program has---
(a) Replicating strength
(b) Double strength
(c) Extra Strength
(d) Harmful power
26. Which city is mentioned for brain virus?
(a) Lahore    (b) Sicago
(c) Lasvegas  (d) Tokyo
27. Physical presence is not necessary ---
(a) In the internet
(b) On the internet
(c) On the TV
(d) On the computer  
28. If anybody is recognized by his online identity, he becomes---
(a) Pseudonym
(b) Trustworthy
(c) Suspicious person
(d) Avatar
29. The name of harmful software is---
i. Package software
ii. Melicious software
iii. Malware
Which one is correct?
(a) i and ii      (b) i and iii
(c) ii and iii   (d) i, ii and iii
30. When a powerful bomb exploded after the Boston marathon?
(a) In 1993     (b) In 1996
(c) In 1999     (d) In 2013
31. Some traditional cybercrimes are---
i. fraud           ii. Spam
iii. Threatening
Which one is correct?
(a) i and ii      (b) i and iii
(c) ii and iii   (d) i, ii and iii
32. A major part of cybercrime is---
(a) Cyber battle
(b) Threatening
(c) Fraud
(d) Disclosing objectionable info
33. What is a powerful weapon to fight against corruption?
(a) ICT          (b) Media
(c) Information (d) Journalist
34. Which of the following is E-Tender portal?
(a) E-commerce   (b) E-Tender
(c) e-gp          (d) E-book
35. Which of the following created environment for hardware?
(a) Software 
(b) Operating system
(c) Antivirus (d) Virus



মন্তব্যসমূহ

এই ব্লগটি থেকে জনপ্রিয় পোস্টগুলি

পাহাড়পুর রচনা

সোনারগাঁও রচনা

প্রতীক, সংকেত, যোজনী