0% found this document useful (0 votes)
12 views2 pages

8A4 Special Round 3 Paper Comp

This document is a Computer Science exam paper for 8th-grade students at Nishat Boys High School in Multan. It consists of objective questions about computer viruses, malware, and security threats, as well as subjective questions requiring explanations and definitions. The exam is structured with a total of 30 marks, divided into objective and subjective sections.

Uploaded by

Usman Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

8A4 Special Round 3 Paper Comp

This document is a Computer Science exam paper for 8th-grade students at Nishat Boys High School in Multan. It consists of objective questions about computer viruses, malware, and security threats, as well as subjective questions requiring explanations and definitions. The exam is structured with a total of 30 marks, divided into objective and subjective sections.

Uploaded by

Usman Hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Nishat Boys High school Multan

Paper: Computer Science Class: 8th A4(Special)


Time: 1 Hour Round: 3 Marks: 30
(Objective)
Q.No1: Circle the correct option. (10x1=10)
1. Which one of the following is a common source of spreading viruses in computer?
a) Infected flash drive b) E-Mail attachment
c) Surfing insecure website d) Pirated software
2. ______ contains the information about malware which can be used to identify
them.
a) Word file b) Virus definition file
c) Excel file d) E-mail attachment
3. A website that is set up to spread a virus for some other unethical purpose is called:
a) Secure website b) Non-informative website
c) Informative website d) Insecure website
4. Software which has been duplicated and distributed without authorization is called
a) Infected flash drive b) E-Mail attachment
c) Surfing insecure website d) Pirated software
5. ___ are computer experts who use their expertise for malicious purpose.
a) Virus b) Adware
c) Worm d) Hackers
6. To protect the computer form most current viruses user must update antivirus__.
a) Weekly b) Regularly
c) Monthly d) None
7. How many common ways through which Virus, Worm and adware spread?
a) Two b) Four
c) Five d) Six
8. Which one is not example of virus?
a) Cascade b) Melissa
c) Frodo d) Win95
9. Type of Threats are:
a) Six b) Five
c) Four d) Three
10. Which one is a not example of antivirus?
a) Win95 b) Nod 32
c) Avast d) SAV
(Subjective)
Section-1
Q.No:2 Attempt any five questions (5x2=10)
i. What is antivirus? Give two examples.
ii. Who is hacker? What can a hacker do?
iii. How adware affect the working of computer.
iv. Define E-mail Attachment?
V. What is computer security threat?
Vi. Define Worms?
Vii. Define Adware?
Section-2
Q.No:3 Attempt any two questions (2x5=10)
i. Differentiate between a virus and worm with examples.
ii.. List some indicators of security threats.
iii. How virus, worms and adware spread though
a) Installing pirated software b) Infected flash drive

You might also like