JSC ICT Model Test 2019
Progress
Test 2019
Class Eight
Sub: Information and Communication Technology(ICT)
Time: 1 Hour Full Marks: 45
Part-A: 10
Answer any two of the following questins
1. What is the captcha? What do you
understand by online identity?
2. What is hacking? Describe.
3. What are the types of computer virus
and what?
4. What is Malware? What is
the way to get rid of Malware?
5. What is cyber crime? Explain it.
Part-B: 35
Progress
Test 2019
Class Eight
Sub:
Information and Communication Technology(ICT)
Namet . . . .
. . . . . . . . . . . . . . . . .. . . .Section: . . . . . . . . . . . . Roll No: . . . . .
. . .
|
|
Fill the
correct / best answer circle with black ball point pen pen. The
value of each question is -1.
|
1. Which of the
following is harmful software?
(a) Mozilla Firefox
(b) Download Manager
(c) Trojan horse
(d) Operamini
2. Which
of the following prevents hacking?
(a)
Firewall (b) Captcha
(c) Antivirus
(d) Bijoy software
3. No one is isolated from others because of---
(a) Computer (b) Network
(c) Movies (d) Television
4. A hacker hacks other’s computers
for—
i. Earn illegally
ii. Harm a person
iii. humiliate an organization
Which
one is correct?
(a) i and ii (b) i and iii
(c) ii and iii (d) i, ii and iii
5. We should take the
help of ICT to make our life…
i. Beautiful ii. Easy iii. Productive
Which
one is correct?
(a) i and ii (b) i and iii
(c) ii and iii (d) i, ii and iii
6. Which is the
invisible security wall?
(a) Password (b) Captcha
(c) Firewall (d) Woodwall
7. Which one of the
following is database software?
(a) Mac OS (b)
Libra Office
(c) MySQL (d) Obontu
8. What is the name of the database?
(a) Datacenter (b) Dataview
(c) Datazone (d) data area
9. Any work in computer is done through---
(a) Typing (b)
programming
(c) Composing (d) Editing
10. Office Management softwares are—
i. MS office ii.
Open Office iii. Libra Office
Which
one is correct?
(a) i and ii (b) i and iii
(c) ii and iii (d) i, ii and iii
11. Website browsers are---
i. Google
ii. Mozila Firefox
iii. Google Chrome
Which
one is correct?
(a) i and ii (b) i and iii
(c) ii and iii (d) i, ii and iii
12. Which of the following is Virus?
(a) Trojan Horse
(b) Computer virus
(c) Adware (d)
Nimda
13. Which of the following is the first internet worm?
(a) Morris worm
(b) Coputer worm
(c) Malicious software
(d) Rootkits
14. Computer virus attack the—
(a) Executable file
(b) Security fault
(c) Operating system
(d) Customize program
15. Which operating system contain the
most of malware?
(a) Mac OS (b)
Linux
(c) Windows (d) Xenix
16. In which date CIH attacks?
(a) 26 March (b) 26 April
(c) 26May (d)
26 June
17. Which one is the self replicating program?
(a) Malware (b)
Virus
(c) Exe File (d)
Reaper virus
18. Which scientist first named virus?
(a) Fredrick B Cohen
(b) John Von Newman
(c) John Lehman
(d) Charles babedge
19. When a virus Elk Cloner started?
(a) In 1975 (b)
In 1982
(c) In 1978 (d)
In 1980
20. Which of the following software has done any
special work?
(a) Application software
(b) Computer virus
(c) Malware
(d) Trojan horse
21. When was the devastating virus exposed?
(a) 1982 (b)
1985
(c) 1986 (d) 1991
22. Spyware and adware do not have any---
(a) Devastating power
(b) Power of replication
(c) Power of spread
(d) Power to born
23. Computer virus damage the system in the way of---
i. Reducing speed
ii. Hanging or freezing
iii. Rebooting
Which
one is correct?
(a) i and ii (b) i and iii
(c) ii and iii (d) i, ii and iii
24. Which virus formatted the hard disk?
(a) Nimda virus
(b) CIH virus
(c) Daprosy worm
(d) Code Red Worm
25. A virus program has---
(a) Replicating strength
(b) Double strength
(c) Extra Strength
(d) Harmful power
26. Which city is mentioned for brain virus?
(a) Lahore (b)
Sicago
(c) Lasvegas (d)
Tokyo
27. Physical presence is not necessary ---
(a) In the internet
(b) On the internet
(c) On the TV
(d) On the computer
28. If anybody is recognized by his online identity, he
becomes---
(a) Pseudonym
(b) Trustworthy
(c) Suspicious person
(d) Avatar
29. The name of harmful software is---
i. Package software
ii. Melicious software
iii. Malware
Which
one is correct?
(a) i and ii (b) i and iii
(c) ii and iii (d) i, ii and iii
30. When a powerful bomb exploded after
the Boston marathon?
(a) In 1993 (b) In 1996
(c) In 1999 (d) In 2013
31. Some traditional cybercrimes are---
i. fraud ii.
Spam
iii. Threatening
Which
one is correct?
(a) i and ii (b) i and iii
(c) ii and iii (d) i, ii and iii
32. A major part of cybercrime is---
(a) Cyber battle
(b) Threatening
(c) Fraud
(d) Disclosing objectionable info
33. What is a powerful weapon to fight
against corruption?
(a) ICT (b) Media
(c) Information (d) Journalist
34. Which of the following is E-Tender
portal?
(a) E-commerce (b) E-Tender
(c) e-gp (d) E-book
35. Which of the following created
environment for hardware?
(a) Software
(b) Operating system
(c) Antivirus (d) Virus
মন্তব্যসমূহ
একটি মন্তব্য পোস্ট করুন