COMPUTER5
COMPUTER5
Class: VIII
Section – I [Marks:12]
Q-1: Choose the best answer.
i. There is no end to this loop.
a. repeat b. forever c. repeat until
ii. Which crime is demanding money to prevent a threatened attack?
a. fraud b. cyber c. cyber
espionage extortion
iii. Which of the following malware displays pop-ups to users?
a. Adware c. Worm
b. Trojan
iv. Which part of the function prompts the user to make an input?
a. parameter c. outcome
b. body
v. What is scratch?
a. Algorithmic language c. Textual-programming
b. Visual programming language language
vi. If ________________ feature is enabled, an infected drive inserted into the computer
will automatically open.
a. auto-open b. auto-run c. auto-start
Q-2: Fill in the blanks.
i. _________________ software is software that has unauthorizedly used software.
i. To create a method, click the Make a block button located in my blocks ________
tab.
ii. When writing programs, some instructions may need to be repeated, this ________
is known as loop.
iii. Antivirus software protects only from worms and trojans but not viruses. ________
iv. The punishment for unauthorized access to information or data in the ________
Pakistani cybercrime law is imprisonment for 3 months and a fine of Rs
50,0000.
v. A trojan is a computer software that replicates itself while moving across ________
computers.
vi. Comment lines in java are not executable. ________
Q-4: Fill the table with the kinds of loop suitable for each state. [ /3]
State Loop