0% found this document useful (0 votes)
110 views2 pages

8th Class Computer Paper

Uploaded by

bilalmusakhel786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views2 pages

8th Class Computer Paper

Uploaded by

bilalmusakhel786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Diamonds Pre-Cadet School Kamar Mushani

Name:___________________ Roll No_________________________ Class____8th_________

Paper______Computer______ Total Marks______50_____________

_________________________________________________________

Objective Type (20*1=20)


1) Algorithm always begins with word Start:
a) True b) False c) Not understandable
2) The entire business plan is _________ in executive summary?
a) Copied b) summarised c) all of these
3) The______is an instance of buying or selling something
a) Transection b) payment c) Sharing
4) Which is not emerging technology?
a) VR b) Rebotic c) 3G
5) ________ Marketing focuses on gathering and endorsing online review
a) Reputation B) WAN c) MAN
6) In _____________ Network computer are not physically connected:
a) LAN b) WAN c) MAN D) none
7) The act of __________ between buyers and seller is called transaction
a) disagreement b) agreement c) WIFI d) routers
8) A digital footprint is also known as:
a) Digital diary b) digital dossier c) Database d) None
9) Which of following are not transaction fraud.
a) identity theft b)cyber troll c) job fraud d) bank
10) Studying from home through the internet is called.
a) I-learning b) e-learning C) c-learning d) None
11) The internet is also called the network of :
a) Network b) Computer c) Rectangle d) A diamonds
12) Crimes that are committed through the internet are called.
a) Cyber crime b) Computational thinking c) fiber crimes
13) Sometimes we want to repeat an action again and again which is called______
a) Iteration b) Solution c) Copying d) deletion
14) Spamming is called
a) Email fraud b) net fraud c) Diamonds
15) Which technique used by cyberciminal to attain information from individuals is called
a) Internet of things b) social engineering c) interest of technology d) None
16) VPN stand s for______
a) Virtual private network b) visual private network c) virtual private netfilx
17) Hacking is ________
a) Crimes b) Not crime c) none
18) Which is not virus.
a) spyware b) Wireless c) ransomware
19) Social media has disadvantages?:
a) Yes b) Noe c) none
20) Youtube is company of+________
a) Yahoo b) Ai c) Google
Subjective type
Question No.2: Attempt any ten questions from following: 2*10=20
i) Define Algorithm.
ii) What do you know about facebook company?
iii) What is content marketing?
iv) Define digital marketing?
v) Define Seo?
vi) What are disadvantages of internet?
vii) Define E mail spoofing?
viii) What is spamming ?
ix) Write meansure to avoid hacking?
x) Define social engineering?
xi) What is plagiarism?
xii) What is virus?
xiii) What is Ethical hacking?
Question No.3: Attempt any Two long questions from the following: 5+5=10
i) Write down disadvantages of internet?
ii) What is virus and explain spyware, keyloggers?
iii) Explain these terms a) SEO B) CPM and PPC c) Email marketing.

You might also like