0% found this document useful (0 votes)
16 views4 pages

Class VIIFirst Term 22

Uploaded by

tapaskumarmahato
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views4 pages

Class VIIFirst Term 22

Uploaded by

tapaskumarmahato
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1. 1. Use appropriate words to fill the blanks.

[10 ×1]

a. The base in a decimal number system is written as ______________.

b. For all odd decimal numbers, the rightmost digit in the equivalent binary number is __________

c. Data ______________ is the translation of data into a form that cannot be read without a deciphering
mechanism.
d. _________ is a short form for malicious software

e. A _________ is secret word or phrase that gives a user access to a particular program or system.

f. ______________ system has a base of eight.

g. In Binary addition, 1+1 equals to__________________-.

h. _______________ Virus infects executable program files.

i. ___________________ keeps traces of the usages of internet of an internet user.

j. ______________ is the attempt to acquire information such as usernames or passwords.

SECTION A

2. 2. Match the items from the two columns of the table given below and redraw the table. [10× 1]
3.
a. Which number system do we use regularly for our day to day work?

b. what is nibble?

c. What is spam?

d. What is a cookie?

e. What is the full form of HTTP?

f. What is the full form of URL?


g. Who invented HTML?

h. Who created ten commandments of computer ethics?

i. What is blog?

3. Choose the correct answer. [10× 1]

a. In binary system the decimal digit 4 is given by


i) 100 ii) 1000 iii) 10 iv) None of these

b. The virus which infects the executables program files.


i) worm ii) Parasite iii) Boot iv) None of these

_________

c. Two nibbles form


i) One byte ii) Two bytes iii) four bytes iv) None of these

d. It keeps traces of the usages of internet of an internet user.


i) ctrl ii) Digital Footprint iii) alt iv) None of these

e. A fragment of code or sequence of computing instructions which has been given a particular
name.
i) Macro ii) Adware iii) Software iv) None of these

f. A stand- alone malware that replicates itself to spread to other computers through the internet.
i) Backdoor ii) worm iii) Exploit iv) None of these

g. The attempt to acquire sensitive information such as usernames, passwords, and credit card
details from internet users
i) Hacking ii) Phishing iii) Pirating iv) None of these

h. An application that obtains data without user’s consent


i) Spyware ii) Cracking iii) Pharming iv) None of these
i. The decimal number 8 is represented by ______________in octal number system.
i) 8 ii) 10 iii) 9 iv) None of these

j. The equivalent decimal value of the binary number 1011


i) 12 ii) 13 iii) 11 iv) 21

4. State whether the following statements are true(T) or false(f). [10× 1]

a. In Spanish-speaking countries, the government uses a spyware called govware.

b. First two digits of all number systems are same.

c. 8 byte is equal to 16 bit.

d. The equivalent decimal number of the BCD number 10010110 is 97.


e. Virus programs can easily spread from one file to another, and then from one computer to
another.

f. Hacking means illegal access of other people’s computer systems to destroy their file.

g. Anti-virus or anti-malware software shold not be used to reduce internet privacy violation.

h. The left most digit of a number is referred to as LSB.

i. The smallest storage unit in a computer is a nibble.

j. The numbers used in octal number system are 1 to 7.

Section – B

1. Answer all the following questions. [4 × 3]

a. Find binary number. b. Find decimal number. c. Find octal number.


(127)10 (10111001)2 (102)10
d. Find hexadecimal number.
(165)10

1. Answer all the following questions. [3× 2]


a. Find out the value of b. Find out the value of c. Find out the value of
(11101+10011)=? (1100-11)=? 11101×111=?

Answer any five (5) questions out of six (6) questions. [5× 2]
a. State one difference and one similarity between virus and worms.
b. What is Exploits?
c. What is Cyber crime?
d. What is Cyber bullying?
e. What is Digital Footprint?
f. What is Multipartite Viruse?

Answer any four (4) questions out of five(5) questions.


1. What is Spyware and write down the name of four types of Spyware? [3]
2. What are the symptoms of virus effected computer? [3]
3. How can you protect your computer from virus and worm? [3]
4. State at least three ways to protect your computer from cyber crime. [3]

You might also like