THE LEARNER’s CORNER ACADEMY ,CHINIOT Total-Marks:35
Monthly Test Series (First Year) MARCH 2024 Q. No. 1 Possible answers are given in each statement. Tick correct one. (10) Sr# Question Statement A B C D 1 _________ is not a biometric technique: Palm Print Retina Face Badge 2 Example of virus is : Macfe Norteon Redflag Redlof 3 Program that interferes normal working of computer: Becteria Virus Anti-Virus None 4 A virus that deletes all Microsoft files is: Trojen Horse Boot Sector Logic Bomb All 5 First sector of hard disk is known as______sector. Root First Boot Booting 6 Illegal copy of software is known as _____software. Copy Illegal Pirated None 7 There are ____techniques of enforce security. 1 2 3 4 8 Virus does not affect the __________. Software Hardware Data Programs 9 A hard disk is divide into ________. Tracks Sectors Both A & B None 10 Virus can spread through _________. USB CD Hard Disk All Q. No. 2 Give Short Answers of any Eight(08) of Following: (8x2=16) i. Define computer security? vi. How boot sector virus effect the system? ii. Describe any two techniques of security. vii. Write a short note “Encryption”. iii. What is meant by term “anti-virus”? viii. How virus make damages in computer system ? iv. Define logic Bomb virus. ix. Why security of data is important? v. What are the advantages of using anti-virus. x. What are intentional threats? LONG QUESTION Q.No.3 How virus spread in computer systems/causes of virus? How virus activated in a system? (9)
THE LEARNER’s CORNER ACADEMY ,CHINIOT Total-Marks:35
Monthly Test Series (First Year) MARCH 2024 Subject:Comp. Sci(T4) Q. No. 1 Possible answers are given in each statement. Tick correct one. (10) Sr# Question Statement A B C D 1 _________ is not a biometric technique: Palm Print Retina Face Badge 2 Example of virus is : Macfe Norteon Redflag Redlof 3 Program that interferes normal working of computer: Becteria Virus Anti-Virus None 4 A virus that deletes all Microsoft files is: Trojen Horse Boot Sector Logic Bomb All 5 First sector of hard disk is known as______sector. Root First Boot Booting 6 Illegal copy of software is known as _____software. Copy Illegal Pirated None 7 There are ____techniques of enforce security. 1 2 3 4 8 Virus does not affect the __________. Software Hardware Data Programs 9 A hard disk is divide into ________. Tracks Sectors Both A & B None 10 Virus can spread through _________. USB CD Hard Disk All Q. No. 2 Give Short Answers of any Eight(08) of Following: (8x2=16) i. Define computer security? vi. How boot sector virus effects the system? ii. Describe any two techniques of security. vii. Write a short note “Encryption”. iii. What is meant by term “anti-virus”? viii. How virus make damages in computer system? iv. Define logic Bomb virus. ix. Why security of data is important? v. What are the advantages of using anti-virus. x. What are intentional threats? LONG QUESTION Q.No.3 How virus spread in computer systems/causes of virus? How virus activated in a system? (9)