0% found this document useful (0 votes)
17 views

8th - Mid

Uploaded by

arslan yaseen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

8th - Mid

Uploaded by

arslan yaseen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

8th computer

Midterm examination

Q No.1 Explain the virus definition/update also give the example. /10.

Q No.2 Briefly explains followings. /20

a) Enlist widely used antivirus.


b) How virus and worms spread through e-mail attachment.
c) Who is hacker? What can hacker do?
d) How adware effect the working of a computer?
e) What is purpose of installing an antivirus in computer?
f) Name the different types of antivirus.
g) What is MAN?
h) Explain the Global Positioning System.
i) Explain the Bluetooth?
j) Write down the advantages and disadvantages of WAN.

Q No. 3 Fill in the blanks. /10

I. In WAN ‘W’ stands for_________________


II. In a computer network a_________________device receive information from sending device.
III. _________________channel or path through which the data or information is transferred from
one place to another in a computer network.
IV. NIC stands for_________________
V. MAN stands for_________________
VI. LAN stands for_________________
VII. In WAN, _________________ is big issue
VIII. MAN is_________________ than LAN.
IX. _________________is global navigation system.
X. A dialup modems ________________ is a communication.

Q No.4 Tick the correct choice for the following questions. /10

1. Which of the followings is a malicious program that replicates and spreads independently and harms
the computer?
a. Virus b. worm c. adware d. spyware
2. Which malicious software records the user behavior?
a. Virus b. worm c. adware d. spyware
3. A website that is set up to spread a virus or for some other unethical purpose called
an________________
a. Secure website b.non informative web c. informative website d. insecure web
4. Which of the following is a computer program that detects, prevents, and takes action to deactivate
or remove malicious programs?
a. Virus program b. operating system c. antivirus program d. word
5. __________contains the information about malware which can be used to identify them.
a. Virus definition b. word file c. excel file d. e-mail
6. Which of the following is a common source of spreading viruses in computer?
a. Infected disks b. email attachments c. surfing insecure websites d. pirated soft.
7. __________ is unauthorized use of computer, network and its resources.
a. Programming b. hacking c. stealing d. Robbing
8. An email virus is computer code sent as_______________ other computers.
a. Email attachment b. internet c. fiber optic d. robbing
9. People who indulge themselves in hacking activities are called______________
a. Police b. hacker c. cracker d. steal
10. Some common types of __________to the computers are Virus, worms, hackers, and adware.
a. Threat b. virus c. disks d. internet

Q No.5 Match the columns: /10

Column A Column B Column C


1. Virus Current viruses
2. Hacker Malicious program
3. Pirated Program Adware
4. Virus Definition Steal password
5. Antivirus Ill legal copying
6. Sending device Coaxial cable
7. Communication device NIC
8. Transmission media Glass tread
9. Network A computer
10. Fiber optic Modem
AVG

You might also like