JSC ICT Model Test 2019-2


Progress Test 2019
Class Eight
Sub: Information and Communication Technology(ICT)
Time: 30 Minute                                                                         Full Marks: 50
Namet . . . . . . . . . . . . . . . . .  . . .. . . .Section:   . . . . . . . . . . Roll No: . . . . . . . .

Fill the correct / best answer circle with black ball point pen pen. The value of each question is -1.


1. What kind of topology is this?
(a) tree                   (b) Bus
(c) Mesh                (d) Star
2. Which of the following is search engine?
i. pipilika.com         ii. bing.com  iii.google.com
Which one is correct?
(a) i and ii               (b) i and iii
(c) ii and iii             (d) i, ii and iii
3. What are the residents of the Internet called?
(a) Citizen              (b) Netizen
(c) buddy               (d) hangout
4. Which of the following device is the combination of Hardware and Software?
(a) Switch              (b) Router
(c) Node                (d) Hub
5. How many servers can a network have?
(a) One                  (b) Two
(c) Three                (d) Too many
6. Which website share ones openion?
(a) Bing                  (b) Twitter
(c) google               (d) yahoo
7. Some traditional cybercrimes are---
i. fraud         ii. Spam       iii. Threatening
Which one is correct?
(a) i and ii               (b) i and iii
(c) ii and iii             (d) i, ii and iii
8. Clients receives information from---
(a) Computer         (b) media
(c) Server               (d) intrnet
9. Which of the following has added new dimensions to Internet entertainment?
(a) Facebook (b) Twitter
(c) Internet games(d) Third party apps
10. A major part of cybercrime is---
(a) Cyber battle      (b) Threatening
(c) Fraud(d) Disclosing objectionable info
11. Database softwares are—
i. MS excel   ii. Oracle
iii. MySQL
Which one is correct?
(a) i and ii               (b) i and iii
(c) ii and iii           (d) i, ii and iii
12. In which date CIH attacks?
(a) 26 March          (b) 26 April
(c) 26May              (d) 26 June
13. Day by day we are on technology and network—
(a) Losing confidence
(b) being dependable
(c) in advanced       (d) Investing
14. Which of the following is used to reduce physical exertion?
(a) Computer         (b) ICT
(c) Robot               (d) Equipments
15. Which of the following is harmful software?
(a) Mozilla Firefox
(b) Download Manager
(c) Trojan horse    (d) Operamini
16. Which of the following is a contribution of information technology?
(a) Man                  (b) society
(c) Network           (d) security
17. Network service provider strong computer is called---
(a) Server              (b) Client
(c) media                (d) Hub
18. Which of the following is the web portal of Bangladesh?
(b) www.digitalportal.gov.bd
(d) digitalbangladesh.com.bd
19. What is the general calculation program?
(a) Word Processor
(b) Spreadsheet program
(c) Debit card         (d) Credit card
20. Which of the following can be read online news?
(a) Mobile phone    (b) Smartphone
(c) Easyphone        (d) Zenphone
21. Which is the biggest ICT based company in Bangladesh?
(a) Sonali Bank      (b) Grameenphone
© Asian development bank (d) World Bank
22. What is full form of WAN?
(a) Wide Area Network
(b) Wide area Natwork
(c) Width area Network
(d) Wade area Network
23. Which of the following is popular antivirus?
(a) CIH                  (b) NORTON
© Avast                 (d) Base
24. Which is used to connect two networks working(operating) under the same protocol?
(a) Router             (b) Switch
(c) hub                   (d) Cable
25. What is server?
(a) A powerful network
(b) A powerful computer
© A communication system
(d) A portable computer
26.  The website www.rjoc.gov.bd is---
(a) Registration     (b) Tourism
(c) Hotel booking    (d) Private website
27. How can you apply for a job from home today?
(a) By using email(b) By using mobile
© By using Laptop(d) By using Desktop
28. Which of the following is outsourcing work?
i. software making
ii. Software development
iii. Website development
Which one is correct?
(a) i and ii               (b) i and iii
(c) ii and iii             (d) i, ii and iii
29. Which of the following can be done by robots?
i. Risky work         ii. Handle the goods
iii. Think differently
Which one is correct?
(a) i and ii             (b) i and iii
(c) ii and iii             (d) i, ii and iii
30. Which Technology played the vital role in Rayhan’s swift surgery?
(a) Computer         (b) Robot
(c) ICT                  (d) The internet
31. Who are doing dangerous works in different factories?
(a) Remote Control(b) Robot
(c) Router              (d) Doctor
32. Which is currently used to withdraw money from the bank?
(a) Check book      (b) Card
(c) Mobile phone    (d) Computer
33. The number of doctors in our country is currently needed –
(a) Not more         (b) less
(c) Not less             (d) Much less
34. Malware disrupt the function of---
i. Operating system
ii. Application software
iii. Package software
Which one is correct?
(a) i and ii             (b) i and iii
(c) ii and iii             (d) i, ii and iii
35. Wi-Fi is the abbreviated from----
(a) Wireless friendship
(b) Wireless friendly
© Wire friendly
(d) Wireless fidelity
36. In which media we can
listen as well as see the picture?
(a) Radio                (b) Television
(c) the internet        (d) Mobile
37. Newspaper is one kind of ---
(a) Broadcast media(b) Electronic media
(c) Global media     (d) Domestic media
38. Which hacker get into a system for dishonest purpose?
(a) Black hat hacker
(b) White hat hacker
(c) Grey hat hacker (d) Ethical hacker
39. Website browsers are---
i. Google      ii. Mozila Firefox
iii. Google Chrome
Which one is correct?
(a) i and ii               (b) i and iii
(c) ii and iii           (d) i, ii and iii
40. Which of the following software is known to us?
(a) System software
(b) Application software
(c) Package software
(d) Customize software






মন্তব্যসমূহ

এই ব্লগটি থেকে জনপ্রিয় পোস্টগুলি

পাহাড়পুর রচনা

সোনারগাঁও রচনা

প্রতীক, সংকেত, যোজনী