Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

COF Sample Paper - Class 9

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Question Paper Code

X X C L S International Cyber Olympiad


Sample Paper by Cyber Olympiad Foundation

Time: 60 Mins. Class 9 Max. Marks: 100

Enrollment No.: ................................ School Name:..........................................................................

Instructions:-
 Total Questions - 50 (2 marks each). Use of electronic devices are not permitted.
 There will be negative marking (-1) for each incorrect answer or filling more than one circle for
an answer. No marks will be awarded or deducted for unattempted questions.
 Rough work should be done in the space provided in the question paper.
 After completing the exam, hand over the OMR sheet to the invigilator.
 Read all the questions carefully before answering.

Q 1. What is cybersecurity?

(a) A type of computer virus

(b) The practice of protecting computer systems and data from theft or damage

(c) A computer network

(d) Integrated Technology

Q 2. Which of the following is a common cybersecurity threat?

(a) Keyboard (b) Worm (c) Monitor (d) CPU

Q 3. Which software is used for making presentations?

(a) Ms PowerPoint (b) Ms Outlook (c) Ms Word (d) Ms Paint

Q 4. Which of the following is an online game?


(a) Super Mario (b) Tetris
(c) Pac-Man (d) Call of Duty: MW II

Q 5. Which of the following is not a live streaming platform?

(a) Kick (b) Twitch (c) Rumble (d) Flipkart


1
Q 6. Which of the following is an example of a strong password?

(a) 123456 b) Password123 (c) P@ssw0rd$ecure (d) Your name

Q 7. What is the purpose of cybersecurity awareness training?

(a) To teach people how to become hackers

(b) To educate individuals and organizations about cybersecurity risks and best practices

(c) To create web pages

(d) To play games online

Q 8. What is a CAPTCHA?

(a) A type of computer virus

(b) A security feature that requires users to solve a puzzle to prove they are human

(c) A computer hardware

(d) A computer training course

Q 9. _______ is a type of software designed to help the user's computer detect viruses
and avoid them.

(a) Malware (b) Adware (c) Antivirus (d) Both (b) and (c)

Q 10. Which one of the following is a type of antivirus program?

(a) Quick heal (b) Mcafee (c) Kaspersky (d) All of these

Q 11. Which of the following refers to stealing one's idea or invention of others and use it
for their own benefits?

(a) Piracy (b) Plagiarism (c) Copyright (d) All of these

Q 12. Which of the following is not a peripheral device?


(a) CPU (b) Monitor (c) Printer (d) Mouse

Q 13. Which of the following is a popular web browser?

(a) Microsoft Office (b) Google Chrome

(c) Adobe Creative Cloud (d) All of these

Question Paper Code


2
X X C L S
Q 14. Which key do you use to capitalize letters while typing?

(a) Shift (b) Ctrl (c) Alt (d) Tab

Q 15. Which computer memory retains data even when the computer is off?

(a) RAM (b) CPU (c) ROM (d) Monitor

Q 16. Which of the following software is used for creating and editing images?

(a) Adobe Photoshop (b) After Effects (c) Ms Paint (d) Adobe Cloud

Q 17. What is the purpose of a firewall in cybersecurity?

(a) To clean viruses from a computer (b) To block unwanted websites

(c) To prevent unauthorized access to a network (d) To increase internet speed

Q 18. What is a VPN?


(a) Virtual Personal Network (b) Virtual Private Network
(c) Visual Personal Network (d) Visual Private Network
Q 19. What is ransomware?

(a) A type of computer hardware

(b) Malware encrypting data and demanding a ransom for release

(c) A computer mouse

(d) A computer keyboard

Q 20. What is "malware" short for?

(a) Malicious software (b) Management software

(c) Masterful software (d) Monitoring software

Q 21. Which of the following is an example of an unguided Transmission media?

(a) Optical Fiber (b) Microwave (c) Coaxial Cable (d) None

Q 22. Which company developed the Windows?

(a) Microsoft (b) Samsung (c) Mitsubishi (d) Apple

Q 23. _________ is an example of nonlinear data structure.


(a) Stack (b) Queue (c) Sorting (d) Tree
Question Paper Code
3
X X C L S
Q 24. In a stack, if a user tries to remove an element from empty stack it is called _______.
(a) Underflow (b) Empty
(c) Overflow (d) Garbage Collection
Q 25. What is the full form of "SSD"?
(a) Solid Secure Drive (b) Solid Secure Disk
(c) Solid State Drive (d) Solid State Disk
Q 26. ___________ is the fastest super computer of the World.
(a) Param 8000 (b) Super 8000 (c) Frontier (d) Fugaku
Q 27. Which of the following is an email client?
(a) Reddit (b) Aol
(c) Bing (d) DuckDuckGo
Q 28. Which of the following is a search engine?
(a) Reddit (b) Aol
(c) ChatGPT (d) DuckDuckGo
Q 29. MAC address is of ___________ .
(a) 24 bits (b) 36 bits (c) 42 bits (d) 48 bits
Q 30. Which of the following appears harmless but actually performs malicious functions
such as deleting or damaging files.
(a) Worm (b) Virus (c) Tojan Horse (d) Ransomware
Q 31. Name the protocol that is used to send emails:
(a) FTP (b) TCP (c) SMTP (d) IP
Q 32. The topology in which all nodes are individually connected to a central connection
point:

(a) Ring (b) Star (c) Bus (d) Tree

Q 33. A computer that stores and shares data with other computers on a network is known
as:
(a) Server (b) Node (c) Client (d) Application

Q 34. The term IP in information technology stands for?


(a) Intellectual Promise (b) Internet Provider (c) Internet Protocol (d) None of these
Question Paper Code
4
X X C L S
Q 35. DNS stands for:
(a) Dynamic Naming System (b) Domain Naming System
(c) Decentralised Network Service (d) Domain Name System
Q 36. What is the meaning of Bandwidth in Network?
(a) Transmission capacity of a communication channels
(b) Connected Computers in the Network
(c) Class of IP used in Network
(d) None of these
Q 37. Which of the following can be Software?

(a) Routers (b) Firewalls (c) Gateway (d) Modems

Q 38. The loss in signal power as light travels down the fiber is called ............. .

(a) Attenuation (b) Propagation (c) Scatteing (d) Refraction

Q 39. What does "HTTP" stand for in a website URL?


(a) Hyper Text Transfer Protocol (b) High-End Text Transfer System

(c) Home Telephone Transfer Provider (d) Help Text Transfer System

Q 40. Which of the following protocol is used for remote terminal connection service?

(a) UDP (b) RARP (c) FTP (d) Telnet

Q 41. Which of the following is a type of independent malicious program that never
required any host program?

(a) Tojan Horse (b) Worm (c) Ransomware (d) Trap Door

Q 42. In order to ensure the security of the data/ information, we need to _____ the data:
(a) Delete (b) Reset (c) Decrypt (d) Encrypt

Q 43. I allow the visited website to store its own information about a user on the user’s
computer. Who am I?
(a) Biscuit (b) Cookie (c) Adware (d) Token

Q 44. Which of the following devices is not a networking device?

(a) Hub (b) Switch (c) Bridge (d) None of these


Question Paper Code
5
X X C L S
Q 45. ARPANET stands for _______.
(a) Advanced Recheck Projects Agency Internet
(b) Advanced Recheck Projects Agency Network
(c) Advanced Research Projects Agency Network
(d) Advanced Research Projects Agency Internet
Q 46. In which of the following switching methods, the message is divided into small
packets?
(a) Message Switching (b) Packet Switching
(c) Circuit Switching (d) Session Switching
Q 47. Name the transmission media best suitable for connecting to hilly areas.
(a) Microwave (b) Twisted pair
(c) Co-axial cable (d) Optical Fiber

Q 48. Which of the following is the latest version of Bluetooth?


(a) Bluetooth v5.0 (b) Bluetooth v6.0
(c) Bluetooth v7.0 (d) Bluetooth v8.0

Q 49. A part of the internet that is not accessible to users using popular search engines
like Google, Bing etc is known as:
(a) Gray Web (b) Deep Web
(c) Dark Web (d) Galaxy Web

Q 50. Who is known as the father of computer security?


(a) William Shatner (b) Bob Hyman
(c) August Kerchkoffs (d) Wil Wheaton

Question Paper Code


6
X X C L S

You might also like