Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Subject: Computer Science(T4)

THE LEARNER’s CORNER ACADEMY ,CHINIOT Total-Marks:35


Monthly Test Series (First Year) MARCH 2024
Q. No. 1 Possible answers are given in each statement. Tick correct one. (10)
Sr# Question Statement A B C D
1 _________ is not a biometric technique: Palm Print Retina Face Badge
2 Example of virus is : Macfe Norteon Redflag Redlof
3 Program that interferes normal working of computer: Becteria Virus Anti-Virus None
4 A virus that deletes all Microsoft files is: Trojen Horse Boot Sector Logic Bomb All
5 First sector of hard disk is known as______sector. Root First Boot Booting
6 Illegal copy of software is known as _____software. Copy Illegal Pirated None
7 There are ____techniques of enforce security. 1 2 3 4
8 Virus does not affect the __________. Software Hardware Data Programs
9 A hard disk is divide into ________. Tracks Sectors Both A & B None
10 Virus can spread through _________. USB CD Hard Disk All
Q. No. 2 Give Short Answers of any Eight(08) of Following: (8x2=16)
i. Define computer security? vi. How boot sector virus effect the system?
ii. Describe any two techniques of security. vii. Write a short note “Encryption”.
iii. What is meant by term “anti-virus”? viii. How virus make damages in computer system ?
iv. Define logic Bomb virus. ix. Why security of data is important?
v. What are the advantages of using anti-virus. x. What are intentional threats?
LONG QUESTION
Q.No.3 How virus spread in computer systems/causes of virus? How virus activated in a system? (9)

THE LEARNER’s CORNER ACADEMY ,CHINIOT Total-Marks:35


Monthly Test Series (First Year) MARCH 2024 Subject:Comp. Sci(T4)
Q. No. 1 Possible answers are given in each statement. Tick correct one. (10)
Sr# Question Statement A B C D
1 _________ is not a biometric technique: Palm Print Retina Face Badge
2 Example of virus is : Macfe Norteon Redflag Redlof
3 Program that interferes normal working of computer: Becteria Virus Anti-Virus None
4 A virus that deletes all Microsoft files is: Trojen Horse Boot Sector Logic Bomb All
5 First sector of hard disk is known as______sector. Root First Boot Booting
6 Illegal copy of software is known as _____software. Copy Illegal Pirated None
7 There are ____techniques of enforce security. 1 2 3 4
8 Virus does not affect the __________. Software Hardware Data Programs
9 A hard disk is divide into ________. Tracks Sectors Both A & B None
10 Virus can spread through _________. USB CD Hard Disk All
Q. No. 2 Give Short Answers of any Eight(08) of Following: (8x2=16)
i. Define computer security? vi. How boot sector virus effects the system?
ii. Describe any two techniques of security. vii. Write a short note “Encryption”.
iii. What is meant by term “anti-virus”? viii. How virus make damages in computer system?
iv. Define logic Bomb virus. ix. Why security of data is important?
v. What are the advantages of using anti-virus. x. What are intentional threats?
LONG QUESTION
Q.No.3 How virus spread in computer systems/causes of virus? How virus activated in a system? (9)

You might also like