Try the 8th Computer Science Chapter 7 Test.
Total Questions10
Time Allowed10
Ch. # | Test Name | MCQs Available | PDF File | Answers Mode | Launch Test |
---|---|---|---|---|---|
1 | 8th Computer Science Chapter 1 Test | 35 | Download PDF | MCQ Answers | Launch Test |
1 | Computer Science 8th Class Online Test | 250 | Download PDF | MCQ Answers | Launch Test |
2 | 8th Computer Science Chapter 2 Test | 35 | Download PDF | MCQ Answers | Launch Test |
3 | 8th Computer Science Chapter 3 Test | 43 | Download PDF | MCQ Answers | Launch Test |
4 | 8th Computer Science Chapter 4 Test | 45 | Download PDF | MCQ Answers | Launch Test |
5 | 8th Computer Science Chapter 5 Test | 19 | Download PDF | MCQ Answers | Launch Test |
6 | 8th Computer Science Chapter 6 Test | 25 | Download PDF | MCQ Answers | Launch Test |
7 | 8th Computer Science Chapter 7 Test | 20 | Download PDF | MCQ Answers | Launch Test |
8 | 8th Computer Science Chapter 8 Test | 28 | Download PDF | MCQ Answers | Launch Test |
Here you can prepare 8th Computer Science Chapter 7 Test. Click the button for 8th Computer Science Chapter 7 100% free full practice test.
Sr. # | Questions | Answers Choice |
---|---|---|
1 | The Website or programs known as..... is where users can share their content. | Internet Social Media Meta e- learning |
2 | At its ismplest, ......... is a sysgtem of moral principles. | Ethics Digital Environment E-mail spoofing None of these |
3 | We can adopt the following meausres to avoid email hacking. | Keep changing your passwords Keep updating your operating system Don't plug into devices you are not sure about All of these |
4 | ---------------- refers to the act of breaking into systems to steal or distroy data. | Spamming Hacking Cracking Cyber troll |
5 | A digital foot printis also known as. | Digital diary Digital dossier Data base None of these |
6 | Styding from home through the internet is called. | <div>I- Learning</div> e- learning c- learning All of these |
7 | It refers to the spoolingof bulk mail by an unidentified source. | Spamming Phishing Hacking Cyber Troll |
8 | ------------- are virtual diaries created by people for share their hobbies, thoughts with like minded people. | Internet Meta Spam Blogs |
9 | Learning conducted via electronic media typicaly on internet is called. | Blog Meta Web-service e-learning |
10 | ------- is a technique used by cyber criminals to gain the information from the dividuals. | Cracking Bullying Social Engineering Spamming |