Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

FASILEDES SECONDAR SCHOOL 2016 SECOND SEMISTER IT FINAL EXAM FOR GRADE 10 TH

I. Write true for correct statement and false for incorrect statement
1. Cyber security applies in a variety of contexts, from business to mobile computing.
2. Cybercrime is any criminal activity that involves a computer, networked device or a network.
3. Privacy is concerned with safeguarding and respecting people’s rights to manage their data in
a broader sense.
4. Security event refers to an occurrence during which school data or its network may have
been exposed.
5. A firewall program does protect you from all viruses.
6. Multimedia plays an important role in education, entertainment, public places, collaboration
and healthcare.
7. Hackers can do several things from stealing your passwords to controlling your computer
through remote access.
II. Match the following term in the correct space
A. Multimedia B. Telemedicine C. Virtual learning D. virtual meeting E. Virtual surgery
8. ______ is a learning experience that is enhanced through utilizing computers and/or the
internet both outside and inside the facilities of the educational organization.
9. ______ enhances the way we learn and understand things. Integration of multiple media such
as text, audio, video, graphics and animation together multiply the impact of the message.
10. ______ is a type of collaboration technique where people from anywhere in the world can
share their ideas using audio, video conferencing, screen sharing, and webinars.
11. ______ is a virtual reality technology that simulates surgical procedures without the need of a
patient or cadaver; instead, it allows surgeons to practice surgery on 3D models.
12. ______ is the exchange of medical information from one location to
another using electronic communication, which improves patient health status.
III. Choose the correct answer from the given alternative
13. A type of SW program designed and developed to protect computers from malware like
viruses, computer worms and spyware. A. virus B. firewall C. antivirus D. Worm
14. Which Types of user account is/are having limited ability to make changes to the computer,
except for personalizing the computer, such as applying a screen saver or changing a theme.
A. Administrator B. Standard C. Guest D. all
15. Which one is/are NOT the Common ways of cyber-attack prevention
A. Use strong passwords B. Protect your data C. being scammed D. Secure your computer
16. Which one is/are the computer security threats
A. computer viruses B. Trojan horses C. adware and ransomware D. all
17. Which Technical Threat Prevention Strategies is Creating multiple copies of data to recover
in case of any data loss using the external hard drive, CD, Flash memory or online data
backup site, such as the cloud, in case of any data loss.
A. Installing antivirus B. Installing firewall C. data backup D. Encrypting data
18. The network security device that monitors incoming and outgoing network traffic and
decides whether to allow or block specific traffic based on a defined set of security rules.
A. virus B. firewall C. antivirus D. UPS
19. ______is concerned with proper handling, processing, storage and usage of personal
information. A. Computer security B. Data security C. Security threat D. Data privacy
20. _____ is concerned with measures that an individual or organization is taking to prevent any
third party from unauthorized access. A. Computer security B. Data security C. Security
threat D. Data privacy
21. A malicious act that aims to corrupt or steal data or disrupt school or organization systems.
A. Computer security B. Data security C. Security threat D. Data privacy
22. Which one is/are not multimedia authoring tools
A. Macromedia Flash B. Computer C. Scanner D. Sound recorder
23. _____ is the practice of defending information from unauthorized access, use, disclosure,
disruption, modification, perusal, inspection, recording or destruction.
A. Computer security B. Data security C. Security threat D. Information security
24. ______also known as cyber security, is about information security as applied to computing
devices such as computers and smartphones as well as computer networks such as private
and public networks including the whole Internet.
A. Computer security B. Data security C. Security threat D. Data privacy
25. Any sort of production that uses imagery and a combination of text, audio and graphics to tell
a story.
A. Multimedia authoring B. Multimedia production C. Multimedia presentation D.
multimedia
26. The process of assembling different types of media contents like text, audio, image,
animations and video as a single stream of information with the help of various software
tools available in the market. A. Multimedia authoring B. Multimedia production
C. Multimedia presentation D. multimedia
27. Which one is/are multimedia authoring packages
A. ImageQ B. Adobe Premier C. Macromedia Flash D. all
28. Which one of the following is the components of multimedia
A. text B. audio C. video D. all
29. Are visual elements often used to point readers and viewers to particular information.
A. text B. audio C. video D. graphics
30. which one of the following is/are NOT hardware requirements for multimedia
A. Central Processing Unit (CPU) B. Random Access Memory (RAM) -1 GB RAM
C. Monitor -Super Virtual Graphics Arrays D. Animation creators like 3D Max
GRADE 10TH IT ANSWER SHEET
NAME___________________________________ SEC.10TH ____ NO.______

1. 6. 11. 16. 21. 26.

2. 7. 12. 17. 22. 27.


60
3. 8. 13. 18. 23. 28.

4. 9. 14. 19. 24. 29.


5. 10. 15. 20. 25. 30. 100

You might also like