8th Computer Science Chapter 7 Test With Answers

image
image
image

8th Computer Science Chapter 7 Test

Sr. # Questions Answers Choice
1 The----- provides you the sebrvices of online shopping, education and etc. Network Internet Both a and b None of these
2 Which of the following are not transaction fraud. Identity theft Cyber troll Job Fraud Banking Fraud
3 The technique used by cybercriminals to attain information from individuals is called. Cyber bullying Cyber troll Social Engineering All of these
4 We can adopt the following meausres to avoid email hacking. Keep changing your passwords Keep updating your operating system Don't plug into devices you are not sure about All of these
5 Spamming refers to. Sending and email from an unidentified source Sending wrong information Sending bulk of information None of these
6 Crimes that are committed through the internet are called. Fiber crimes Internet crimes Cyber crimes None of these
7 Why do hackers break into the other's comptuer system. To steal importnat data To destroy the system Both a and b None of these
8 A digital foot printis also known as. Digital diary Digital dossier Data base None of these
9 Styding from home through the internet is called. <div>I- Learning</div> e- learning c- learning All of these
10 The internet is also called the network of Computers Network Mobiles Tablets
Download This Set